Sep 13 00:03:52.050410 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Sep 13 00:03:52.050451 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Sep 12 23:05:37 -00 2025 Sep 13 00:03:52.050476 kernel: efi: EFI v2.70 by EDK II Sep 13 00:03:52.050492 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7affea98 MEMRESERVE=0x716fcf98 Sep 13 00:03:52.050507 kernel: ACPI: Early table checksum verification disabled Sep 13 00:03:52.050521 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Sep 13 00:03:52.050551 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Sep 13 00:03:52.050568 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Sep 13 00:03:52.050583 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Sep 13 00:03:52.050599 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Sep 13 00:03:52.050622 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Sep 13 00:03:52.050637 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Sep 13 00:03:52.050651 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Sep 13 00:03:52.050666 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Sep 13 00:03:52.050683 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Sep 13 00:03:52.050704 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Sep 13 00:03:52.050719 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Sep 13 00:03:52.050735 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Sep 13 00:03:52.050750 kernel: printk: bootconsole [uart0] enabled Sep 13 00:03:52.050766 kernel: NUMA: Failed to initialise from firmware Sep 13 00:03:52.050784 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Sep 13 00:03:52.050800 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Sep 13 00:03:52.050817 kernel: Zone ranges: Sep 13 00:03:52.050833 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Sep 13 00:03:52.050848 kernel: DMA32 empty Sep 13 00:03:52.050862 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Sep 13 00:03:52.050883 kernel: Movable zone start for each node Sep 13 00:03:52.050899 kernel: Early memory node ranges Sep 13 00:03:52.050913 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Sep 13 00:03:52.050928 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Sep 13 00:03:52.050943 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Sep 13 00:03:52.050958 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Sep 13 00:03:52.050972 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Sep 13 00:03:52.050987 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Sep 13 00:03:52.051002 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Sep 13 00:03:52.051016 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Sep 13 00:03:52.051031 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Sep 13 00:03:52.051046 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Sep 13 00:03:52.051065 kernel: psci: probing for conduit method from ACPI. Sep 13 00:03:52.051080 kernel: psci: PSCIv1.0 detected in firmware. Sep 13 00:03:52.051102 kernel: psci: Using standard PSCI v0.2 function IDs Sep 13 00:03:52.051118 kernel: psci: Trusted OS migration not required Sep 13 00:03:52.051201 kernel: psci: SMC Calling Convention v1.1 Sep 13 00:03:52.052307 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000001) Sep 13 00:03:52.052337 kernel: ACPI: SRAT not present Sep 13 00:03:52.052353 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Sep 13 00:03:52.052369 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Sep 13 00:03:52.052385 kernel: pcpu-alloc: [0] 0 [0] 1 Sep 13 00:03:52.052401 kernel: Detected PIPT I-cache on CPU0 Sep 13 00:03:52.052417 kernel: CPU features: detected: GIC system register CPU interface Sep 13 00:03:52.052432 kernel: CPU features: detected: Spectre-v2 Sep 13 00:03:52.052448 kernel: CPU features: detected: Spectre-v3a Sep 13 00:03:52.052464 kernel: CPU features: detected: Spectre-BHB Sep 13 00:03:52.052479 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 13 00:03:52.052504 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 13 00:03:52.052520 kernel: CPU features: detected: ARM erratum 1742098 Sep 13 00:03:52.052536 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Sep 13 00:03:52.052552 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Sep 13 00:03:52.052567 kernel: Policy zone: Normal Sep 13 00:03:52.052586 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 00:03:52.052603 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:03:52.052619 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 00:03:52.052635 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 00:03:52.052650 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:03:52.052673 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Sep 13 00:03:52.052691 kernel: Memory: 3824460K/4030464K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 206004K reserved, 0K cma-reserved) Sep 13 00:03:52.052708 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:03:52.052723 kernel: trace event string verifier disabled Sep 13 00:03:52.052739 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 13 00:03:52.052756 kernel: rcu: RCU event tracing is enabled. Sep 13 00:03:52.052772 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:03:52.052788 kernel: Trampoline variant of Tasks RCU enabled. Sep 13 00:03:52.052804 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:03:52.052820 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:03:52.052835 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:03:52.052851 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 13 00:03:52.052873 kernel: GICv3: 96 SPIs implemented Sep 13 00:03:52.052889 kernel: GICv3: 0 Extended SPIs implemented Sep 13 00:03:52.052905 kernel: GICv3: Distributor has no Range Selector support Sep 13 00:03:52.052920 kernel: Root IRQ handler: gic_handle_irq Sep 13 00:03:52.052935 kernel: GICv3: 16 PPIs implemented Sep 13 00:03:52.052951 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Sep 13 00:03:52.052966 kernel: ACPI: SRAT not present Sep 13 00:03:52.052981 kernel: ITS [mem 0x10080000-0x1009ffff] Sep 13 00:03:52.052996 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Sep 13 00:03:52.053012 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Sep 13 00:03:52.053027 kernel: GICv3: using LPI property table @0x00000004000b0000 Sep 13 00:03:52.053047 kernel: ITS: Using hypervisor restricted LPI range [128] Sep 13 00:03:52.053064 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Sep 13 00:03:52.053079 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Sep 13 00:03:52.053095 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Sep 13 00:03:52.053111 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Sep 13 00:03:52.053160 kernel: Console: colour dummy device 80x25 Sep 13 00:03:52.053185 kernel: printk: console [tty1] enabled Sep 13 00:03:52.053201 kernel: ACPI: Core revision 20210730 Sep 13 00:03:52.053218 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Sep 13 00:03:52.053234 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:03:52.053258 kernel: LSM: Security Framework initializing Sep 13 00:03:52.053276 kernel: SELinux: Initializing. Sep 13 00:03:52.053292 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 00:03:52.053309 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 00:03:52.053325 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:03:52.053341 kernel: Platform MSI: ITS@0x10080000 domain created Sep 13 00:03:52.053357 kernel: PCI/MSI: ITS@0x10080000 domain created Sep 13 00:03:52.053372 kernel: Remapping and enabling EFI services. Sep 13 00:03:52.053388 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:03:52.053403 kernel: Detected PIPT I-cache on CPU1 Sep 13 00:03:52.053424 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Sep 13 00:03:52.053440 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Sep 13 00:03:52.053456 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Sep 13 00:03:52.053473 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:03:52.053489 kernel: SMP: Total of 2 processors activated. Sep 13 00:03:52.053504 kernel: CPU features: detected: 32-bit EL0 Support Sep 13 00:03:52.053521 kernel: CPU features: detected: 32-bit EL1 Support Sep 13 00:03:52.053538 kernel: CPU features: detected: CRC32 instructions Sep 13 00:03:52.053554 kernel: CPU: All CPU(s) started at EL1 Sep 13 00:03:52.053575 kernel: alternatives: patching kernel code Sep 13 00:03:52.053591 kernel: devtmpfs: initialized Sep 13 00:03:52.053621 kernel: KASLR disabled due to lack of seed Sep 13 00:03:52.053642 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:03:52.053660 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:03:52.053677 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:03:52.053693 kernel: SMBIOS 3.0.0 present. Sep 13 00:03:52.053709 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Sep 13 00:03:52.053727 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:03:52.053745 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 13 00:03:52.053763 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 13 00:03:52.053786 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 13 00:03:52.053802 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:03:52.053819 kernel: audit: type=2000 audit(0.301:1): state=initialized audit_enabled=0 res=1 Sep 13 00:03:52.053836 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:03:52.053853 kernel: cpuidle: using governor menu Sep 13 00:03:52.053873 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 13 00:03:52.053890 kernel: ASID allocator initialised with 32768 entries Sep 13 00:03:52.053907 kernel: ACPI: bus type PCI registered Sep 13 00:03:52.053923 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:03:52.053939 kernel: Serial: AMBA PL011 UART driver Sep 13 00:03:52.053956 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 00:03:52.053973 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 13 00:03:52.053989 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:03:52.054006 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 13 00:03:52.054028 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:03:52.054045 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 13 00:03:52.054062 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:03:52.054078 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:03:52.054094 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:03:52.054111 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:03:52.054173 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:03:52.054197 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:03:52.054215 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:03:52.054231 kernel: ACPI: Interpreter enabled Sep 13 00:03:52.054273 kernel: ACPI: Using GIC for interrupt routing Sep 13 00:03:52.054298 kernel: ACPI: MCFG table detected, 1 entries Sep 13 00:03:52.054315 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Sep 13 00:03:52.054653 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 13 00:03:52.054953 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Sep 13 00:03:52.055439 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Sep 13 00:03:52.055856 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Sep 13 00:03:52.056328 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Sep 13 00:03:52.056372 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Sep 13 00:03:52.056403 kernel: acpiphp: Slot [1] registered Sep 13 00:03:52.056437 kernel: acpiphp: Slot [2] registered Sep 13 00:03:52.056454 kernel: acpiphp: Slot [3] registered Sep 13 00:03:52.056491 kernel: acpiphp: Slot [4] registered Sep 13 00:03:52.056531 kernel: acpiphp: Slot [5] registered Sep 13 00:03:52.056570 kernel: acpiphp: Slot [6] registered Sep 13 00:03:52.056608 kernel: acpiphp: Slot [7] registered Sep 13 00:03:52.056654 kernel: acpiphp: Slot [8] registered Sep 13 00:03:52.056694 kernel: acpiphp: Slot [9] registered Sep 13 00:03:52.056733 kernel: acpiphp: Slot [10] registered Sep 13 00:03:52.056773 kernel: acpiphp: Slot [11] registered Sep 13 00:03:52.056807 kernel: acpiphp: Slot [12] registered Sep 13 00:03:52.056826 kernel: acpiphp: Slot [13] registered Sep 13 00:03:52.056860 kernel: acpiphp: Slot [14] registered Sep 13 00:03:52.056896 kernel: acpiphp: Slot [15] registered Sep 13 00:03:52.056925 kernel: acpiphp: Slot [16] registered Sep 13 00:03:52.056973 kernel: acpiphp: Slot [17] registered Sep 13 00:03:52.057002 kernel: acpiphp: Slot [18] registered Sep 13 00:03:52.057037 kernel: acpiphp: Slot [19] registered Sep 13 00:03:52.057073 kernel: acpiphp: Slot [20] registered Sep 13 00:03:52.057110 kernel: acpiphp: Slot [21] registered Sep 13 00:03:52.076930 kernel: acpiphp: Slot [22] registered Sep 13 00:03:52.076963 kernel: acpiphp: Slot [23] registered Sep 13 00:03:52.076981 kernel: acpiphp: Slot [24] registered Sep 13 00:03:52.076998 kernel: acpiphp: Slot [25] registered Sep 13 00:03:52.077015 kernel: acpiphp: Slot [26] registered Sep 13 00:03:52.077043 kernel: acpiphp: Slot [27] registered Sep 13 00:03:52.077059 kernel: acpiphp: Slot [28] registered Sep 13 00:03:52.077075 kernel: acpiphp: Slot [29] registered Sep 13 00:03:52.077091 kernel: acpiphp: Slot [30] registered Sep 13 00:03:52.077108 kernel: acpiphp: Slot [31] registered Sep 13 00:03:52.077162 kernel: PCI host bridge to bus 0000:00 Sep 13 00:03:52.077456 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Sep 13 00:03:52.077656 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Sep 13 00:03:52.077850 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Sep 13 00:03:52.078052 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Sep 13 00:03:52.078390 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Sep 13 00:03:52.078642 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Sep 13 00:03:52.078872 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Sep 13 00:03:52.079164 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Sep 13 00:03:52.079432 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Sep 13 00:03:52.079655 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 13 00:03:52.079891 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Sep 13 00:03:52.080105 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Sep 13 00:03:52.080391 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Sep 13 00:03:52.080615 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Sep 13 00:03:52.080835 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 13 00:03:52.081054 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Sep 13 00:03:52.100474 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Sep 13 00:03:52.100725 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Sep 13 00:03:52.100942 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Sep 13 00:03:52.101211 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Sep 13 00:03:52.101437 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Sep 13 00:03:52.101636 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Sep 13 00:03:52.101841 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Sep 13 00:03:52.101869 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Sep 13 00:03:52.101887 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Sep 13 00:03:52.101905 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Sep 13 00:03:52.101922 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Sep 13 00:03:52.101939 kernel: iommu: Default domain type: Translated Sep 13 00:03:52.101956 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 13 00:03:52.101973 kernel: vgaarb: loaded Sep 13 00:03:52.101989 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:03:52.102015 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:03:52.102032 kernel: PTP clock support registered Sep 13 00:03:52.102049 kernel: Registered efivars operations Sep 13 00:03:52.102066 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 13 00:03:52.102083 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:03:52.102101 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:03:52.102120 kernel: pnp: PnP ACPI init Sep 13 00:03:52.103513 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Sep 13 00:03:52.103558 kernel: pnp: PnP ACPI: found 1 devices Sep 13 00:03:52.103576 kernel: NET: Registered PF_INET protocol family Sep 13 00:03:52.103593 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 00:03:52.103610 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 13 00:03:52.103627 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:03:52.103644 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 00:03:52.103661 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 13 00:03:52.103678 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 13 00:03:52.103695 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 00:03:52.103716 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 00:03:52.103734 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:03:52.103751 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:03:52.103767 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Sep 13 00:03:52.103784 kernel: kvm [1]: HYP mode not available Sep 13 00:03:52.103801 kernel: Initialise system trusted keyrings Sep 13 00:03:52.103818 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 13 00:03:52.103834 kernel: Key type asymmetric registered Sep 13 00:03:52.103850 kernel: Asymmetric key parser 'x509' registered Sep 13 00:03:52.103871 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:03:52.103888 kernel: io scheduler mq-deadline registered Sep 13 00:03:52.103904 kernel: io scheduler kyber registered Sep 13 00:03:52.103920 kernel: io scheduler bfq registered Sep 13 00:03:52.104181 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Sep 13 00:03:52.104212 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Sep 13 00:03:52.104229 kernel: ACPI: button: Power Button [PWRB] Sep 13 00:03:52.104246 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Sep 13 00:03:52.104262 kernel: ACPI: button: Sleep Button [SLPB] Sep 13 00:03:52.104286 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:03:52.104303 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Sep 13 00:03:52.104516 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Sep 13 00:03:52.104542 kernel: printk: console [ttyS0] disabled Sep 13 00:03:52.104560 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Sep 13 00:03:52.104577 kernel: printk: console [ttyS0] enabled Sep 13 00:03:52.104594 kernel: printk: bootconsole [uart0] disabled Sep 13 00:03:52.104611 kernel: thunder_xcv, ver 1.0 Sep 13 00:03:52.104628 kernel: thunder_bgx, ver 1.0 Sep 13 00:03:52.104652 kernel: nicpf, ver 1.0 Sep 13 00:03:52.104669 kernel: nicvf, ver 1.0 Sep 13 00:03:52.104920 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 13 00:03:52.105122 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-13T00:03:51 UTC (1757721831) Sep 13 00:03:52.105179 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 00:03:52.105196 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:03:52.105212 kernel: Segment Routing with IPv6 Sep 13 00:03:52.105228 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:03:52.105255 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:03:52.105280 kernel: Key type dns_resolver registered Sep 13 00:03:52.105312 kernel: registered taskstats version 1 Sep 13 00:03:52.105332 kernel: Loading compiled-in X.509 certificates Sep 13 00:03:52.105366 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 47ac98e9306f36eebe4291d409359a5a5d0c2b9c' Sep 13 00:03:52.105404 kernel: Key type .fscrypt registered Sep 13 00:03:52.105424 kernel: Key type fscrypt-provisioning registered Sep 13 00:03:52.105442 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:03:52.105462 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:03:52.105487 kernel: ima: No architecture policies found Sep 13 00:03:52.105510 kernel: clk: Disabling unused clocks Sep 13 00:03:52.105526 kernel: Freeing unused kernel memory: 36416K Sep 13 00:03:52.105543 kernel: Run /init as init process Sep 13 00:03:52.105559 kernel: with arguments: Sep 13 00:03:52.105576 kernel: /init Sep 13 00:03:52.105592 kernel: with environment: Sep 13 00:03:52.105608 kernel: HOME=/ Sep 13 00:03:52.105624 kernel: TERM=linux Sep 13 00:03:52.105645 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:03:52.105667 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:03:52.105689 systemd[1]: Detected virtualization amazon. Sep 13 00:03:52.105707 systemd[1]: Detected architecture arm64. Sep 13 00:03:52.105725 systemd[1]: Running in initrd. Sep 13 00:03:52.105742 systemd[1]: No hostname configured, using default hostname. Sep 13 00:03:52.105760 systemd[1]: Hostname set to . Sep 13 00:03:52.105782 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:03:52.105800 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:03:52.105817 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:03:52.105835 systemd[1]: Reached target cryptsetup.target. Sep 13 00:03:52.105853 systemd[1]: Reached target paths.target. Sep 13 00:03:52.105870 systemd[1]: Reached target slices.target. Sep 13 00:03:52.105888 systemd[1]: Reached target swap.target. Sep 13 00:03:52.105906 systemd[1]: Reached target timers.target. Sep 13 00:03:52.105929 systemd[1]: Listening on iscsid.socket. Sep 13 00:03:52.105948 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:03:52.105966 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:03:52.105984 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:03:52.106002 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:03:52.106020 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:03:52.106037 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:03:52.106055 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:03:52.106078 systemd[1]: Reached target sockets.target. Sep 13 00:03:52.106096 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:03:52.106114 systemd[1]: Finished network-cleanup.service. Sep 13 00:03:52.106156 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:03:52.106177 systemd[1]: Starting systemd-journald.service... Sep 13 00:03:52.106195 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:03:52.106212 systemd[1]: Starting systemd-resolved.service... Sep 13 00:03:52.106230 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:03:52.106247 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:03:52.106294 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:03:52.106315 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:03:52.106334 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:03:52.106352 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:03:52.106371 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:03:52.106391 kernel: audit: type=1130 audit(1757721832.083:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.106416 systemd-journald[309]: Journal started Sep 13 00:03:52.106539 systemd-journald[309]: Runtime Journal (/run/log/journal/ec251532cd627905e174621ba488d902) is 8.0M, max 75.4M, 67.4M free. Sep 13 00:03:52.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.012323 systemd-modules-load[310]: Inserted module 'overlay' Sep 13 00:03:52.130895 systemd[1]: Started systemd-journald.service. Sep 13 00:03:52.130938 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:03:52.130971 kernel: Bridge firewalling registered Sep 13 00:03:52.128981 systemd-modules-load[310]: Inserted module 'br_netfilter' Sep 13 00:03:52.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.146361 kernel: audit: type=1130 audit(1757721832.129:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.131571 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:03:52.175813 kernel: audit: type=1130 audit(1757721832.145:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.147856 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:03:52.166663 systemd-resolved[311]: Positive Trust Anchors: Sep 13 00:03:52.166677 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:03:52.166730 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:03:52.210610 dracut-cmdline[326]: dracut-dracut-053 Sep 13 00:03:52.214597 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 00:03:52.250236 kernel: SCSI subsystem initialized Sep 13 00:03:52.250292 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:03:52.260192 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:03:52.260318 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:03:52.261866 systemd-modules-load[310]: Inserted module 'dm_multipath' Sep 13 00:03:52.268012 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:03:52.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.273648 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:03:52.292327 kernel: audit: type=1130 audit(1757721832.271:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.312331 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:03:52.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.331178 kernel: audit: type=1130 audit(1757721832.320:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.397172 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:03:52.420170 kernel: iscsi: registered transport (tcp) Sep 13 00:03:52.448355 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:03:52.448426 kernel: QLogic iSCSI HBA Driver Sep 13 00:03:52.634215 systemd-resolved[311]: Defaulting to hostname 'linux'. Sep 13 00:03:52.639053 kernel: random: crng init done Sep 13 00:03:52.640722 systemd[1]: Started systemd-resolved.service. Sep 13 00:03:52.650847 systemd[1]: Reached target nss-lookup.target. Sep 13 00:03:52.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.665175 kernel: audit: type=1130 audit(1757721832.649:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.668208 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:03:52.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.683346 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:03:52.695095 kernel: audit: type=1130 audit(1757721832.670:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:52.757174 kernel: raid6: neonx8 gen() 6153 MB/s Sep 13 00:03:52.773183 kernel: raid6: neonx8 xor() 4786 MB/s Sep 13 00:03:52.791177 kernel: raid6: neonx4 gen() 6437 MB/s Sep 13 00:03:52.809181 kernel: raid6: neonx4 xor() 4983 MB/s Sep 13 00:03:52.827181 kernel: raid6: neonx2 gen() 5491 MB/s Sep 13 00:03:52.845187 kernel: raid6: neonx2 xor() 4454 MB/s Sep 13 00:03:52.863186 kernel: raid6: neonx1 gen() 4412 MB/s Sep 13 00:03:52.881188 kernel: raid6: neonx1 xor() 3655 MB/s Sep 13 00:03:52.899189 kernel: raid6: int64x8 gen() 3376 MB/s Sep 13 00:03:52.917192 kernel: raid6: int64x8 xor() 2080 MB/s Sep 13 00:03:52.935194 kernel: raid6: int64x4 gen() 3748 MB/s Sep 13 00:03:52.953180 kernel: raid6: int64x4 xor() 2170 MB/s Sep 13 00:03:52.971182 kernel: raid6: int64x2 gen() 3518 MB/s Sep 13 00:03:52.989176 kernel: raid6: int64x2 xor() 1727 MB/s Sep 13 00:03:53.007182 kernel: raid6: int64x1 gen() 2515 MB/s Sep 13 00:03:53.026706 kernel: raid6: int64x1 xor() 1411 MB/s Sep 13 00:03:53.026783 kernel: raid6: using algorithm neonx4 gen() 6437 MB/s Sep 13 00:03:53.026809 kernel: raid6: .... xor() 4983 MB/s, rmw enabled Sep 13 00:03:53.028562 kernel: raid6: using neon recovery algorithm Sep 13 00:03:53.048181 kernel: xor: measuring software checksum speed Sep 13 00:03:53.048250 kernel: 8regs : 8709 MB/sec Sep 13 00:03:53.051664 kernel: 32regs : 11079 MB/sec Sep 13 00:03:53.053583 kernel: arm64_neon : 9563 MB/sec Sep 13 00:03:53.053616 kernel: xor: using function: 32regs (11079 MB/sec) Sep 13 00:03:53.159191 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 13 00:03:53.180632 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:03:53.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:53.193476 systemd[1]: Starting systemd-udevd.service... Sep 13 00:03:53.212353 kernel: audit: type=1130 audit(1757721833.186:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:53.212394 kernel: audit: type=1334 audit(1757721833.186:10): prog-id=7 op=LOAD Sep 13 00:03:53.186000 audit: BPF prog-id=7 op=LOAD Sep 13 00:03:53.186000 audit: BPF prog-id=8 op=LOAD Sep 13 00:03:53.226671 systemd-udevd[509]: Using default interface naming scheme 'v252'. Sep 13 00:03:53.238822 systemd[1]: Started systemd-udevd.service. Sep 13 00:03:53.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:53.251460 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:03:53.283753 dracut-pre-trigger[517]: rd.md=0: removing MD RAID activation Sep 13 00:03:53.347837 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:03:53.353704 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:03:53.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:53.469995 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:03:53.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:53.614594 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Sep 13 00:03:53.614671 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Sep 13 00:03:53.637000 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Sep 13 00:03:53.637045 kernel: ena 0000:00:05.0: ENA device version: 0.10 Sep 13 00:03:53.637351 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Sep 13 00:03:53.637584 kernel: nvme nvme0: pci function 0000:00:04.0 Sep 13 00:03:53.637852 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:e4:3b:0f:4e:5f Sep 13 00:03:53.643200 kernel: nvme nvme0: 2/0/0 default/read/poll queues Sep 13 00:03:53.651799 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 13 00:03:53.651876 kernel: GPT:9289727 != 16777215 Sep 13 00:03:53.651919 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 13 00:03:53.655417 kernel: GPT:9289727 != 16777215 Sep 13 00:03:53.655485 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 13 00:03:53.658907 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:03:53.666558 (udev-worker)[553]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:03:53.762175 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (560) Sep 13 00:03:53.862060 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:03:53.879746 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:03:53.902570 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:03:53.915919 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:03:53.920579 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:03:53.930483 systemd[1]: Starting disk-uuid.service... Sep 13 00:03:53.949177 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:03:53.952269 disk-uuid[656]: Primary Header is updated. Sep 13 00:03:53.952269 disk-uuid[656]: Secondary Entries is updated. Sep 13 00:03:53.952269 disk-uuid[656]: Secondary Header is updated. Sep 13 00:03:54.979162 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Sep 13 00:03:54.979299 disk-uuid[657]: The operation has completed successfully. Sep 13 00:03:55.166781 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:03:55.167418 systemd[1]: Finished disk-uuid.service. Sep 13 00:03:55.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.194403 systemd[1]: Starting verity-setup.service... Sep 13 00:03:55.229176 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 13 00:03:55.307695 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:03:55.316517 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:03:55.324560 systemd[1]: Finished verity-setup.service. Sep 13 00:03:55.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.419158 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:03:55.420068 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:03:55.424211 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:03:55.431476 systemd[1]: Starting ignition-setup.service... Sep 13 00:03:55.439954 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:03:55.462903 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:03:55.462975 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:03:55.465379 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:03:55.501177 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:03:55.522381 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:03:55.553653 systemd[1]: Finished ignition-setup.service. Sep 13 00:03:55.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.558511 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:03:55.597577 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:03:55.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.606000 audit: BPF prog-id=9 op=LOAD Sep 13 00:03:55.608693 systemd[1]: Starting systemd-networkd.service... Sep 13 00:03:55.667186 systemd-networkd[1170]: lo: Link UP Sep 13 00:03:55.667209 systemd-networkd[1170]: lo: Gained carrier Sep 13 00:03:55.671613 systemd-networkd[1170]: Enumeration completed Sep 13 00:03:55.688953 kernel: kauditd_printk_skb: 10 callbacks suppressed Sep 13 00:03:55.688992 kernel: audit: type=1130 audit(1757721835.673:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.672105 systemd-networkd[1170]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:03:55.672371 systemd[1]: Started systemd-networkd.service. Sep 13 00:03:55.674837 systemd[1]: Reached target network.target. Sep 13 00:03:55.693271 systemd[1]: Starting iscsiuio.service... Sep 13 00:03:55.701645 systemd-networkd[1170]: eth0: Link UP Sep 13 00:03:55.701662 systemd-networkd[1170]: eth0: Gained carrier Sep 13 00:03:55.724918 systemd[1]: Started iscsiuio.service. Sep 13 00:03:55.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.737825 systemd[1]: Starting iscsid.service... Sep 13 00:03:55.744513 kernel: audit: type=1130 audit(1757721835.723:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.738310 systemd-networkd[1170]: eth0: DHCPv4 address 172.31.27.21/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 13 00:03:55.753764 iscsid[1175]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:03:55.753764 iscsid[1175]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:03:55.753764 iscsid[1175]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:03:55.775258 iscsid[1175]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:03:55.775258 iscsid[1175]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:03:55.775258 iscsid[1175]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:03:55.793388 systemd[1]: Started iscsid.service. Sep 13 00:03:55.812277 kernel: audit: type=1130 audit(1757721835.792:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.799389 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:03:55.848387 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:03:55.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.855168 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:03:55.872619 kernel: audit: type=1130 audit(1757721835.853:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.865950 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:03:55.868303 systemd[1]: Reached target remote-fs.target. Sep 13 00:03:55.873030 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:03:55.908645 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:03:55.923877 kernel: audit: type=1130 audit(1757721835.912:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:55.976863 ignition[1148]: Ignition 2.14.0 Sep 13 00:03:55.976899 ignition[1148]: Stage: fetch-offline Sep 13 00:03:55.981396 ignition[1148]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:03:55.981506 ignition[1148]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:03:56.011300 ignition[1148]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:03:56.014499 ignition[1148]: Ignition finished successfully Sep 13 00:03:56.018774 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:03:56.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.027599 systemd[1]: Starting ignition-fetch.service... Sep 13 00:03:56.039190 kernel: audit: type=1130 audit(1757721836.024:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.049672 ignition[1194]: Ignition 2.14.0 Sep 13 00:03:56.049701 ignition[1194]: Stage: fetch Sep 13 00:03:56.050004 ignition[1194]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:03:56.050065 ignition[1194]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:03:56.069935 ignition[1194]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:03:56.073061 ignition[1194]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:03:56.084208 ignition[1194]: INFO : PUT result: OK Sep 13 00:03:56.088609 ignition[1194]: DEBUG : parsed url from cmdline: "" Sep 13 00:03:56.088609 ignition[1194]: INFO : no config URL provided Sep 13 00:03:56.093952 ignition[1194]: INFO : reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:03:56.093952 ignition[1194]: INFO : no config at "/usr/lib/ignition/user.ign" Sep 13 00:03:56.093952 ignition[1194]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:03:56.093952 ignition[1194]: INFO : PUT result: OK Sep 13 00:03:56.112064 ignition[1194]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Sep 13 00:03:56.112064 ignition[1194]: INFO : GET result: OK Sep 13 00:03:56.112064 ignition[1194]: DEBUG : parsing config with SHA512: 6369f03a7fb2632f2d86be9dd32cbf48a47f8063b449310923b089b90ca0d8e570a984e51c0f9f3b7f2b2242fb94dd8917f556f3f56fadc6d5166b92671120a5 Sep 13 00:03:56.138895 kernel: audit: type=1130 audit(1757721836.124:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.111871 unknown[1194]: fetched base config from "system" Sep 13 00:03:56.113058 ignition[1194]: fetch: fetch complete Sep 13 00:03:56.111889 unknown[1194]: fetched base config from "system" Sep 13 00:03:56.113071 ignition[1194]: fetch: fetch passed Sep 13 00:03:56.111903 unknown[1194]: fetched user config from "aws" Sep 13 00:03:56.113191 ignition[1194]: Ignition finished successfully Sep 13 00:03:56.118724 systemd[1]: Finished ignition-fetch.service. Sep 13 00:03:56.154523 systemd[1]: Starting ignition-kargs.service... Sep 13 00:03:56.171959 ignition[1200]: Ignition 2.14.0 Sep 13 00:03:56.171989 ignition[1200]: Stage: kargs Sep 13 00:03:56.172349 ignition[1200]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:03:56.172414 ignition[1200]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:03:56.188585 ignition[1200]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:03:56.187344 ignition[1200]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:03:56.199066 ignition[1200]: INFO : PUT result: OK Sep 13 00:03:56.204912 ignition[1200]: kargs: kargs passed Sep 13 00:03:56.205276 ignition[1200]: Ignition finished successfully Sep 13 00:03:56.212399 systemd[1]: Finished ignition-kargs.service. Sep 13 00:03:56.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.221933 systemd[1]: Starting ignition-disks.service... Sep 13 00:03:56.234828 kernel: audit: type=1130 audit(1757721836.219:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.243967 ignition[1206]: Ignition 2.14.0 Sep 13 00:03:56.243995 ignition[1206]: Stage: disks Sep 13 00:03:56.244321 ignition[1206]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:03:56.244380 ignition[1206]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:03:56.260783 ignition[1206]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:03:56.263514 ignition[1206]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:03:56.267065 ignition[1206]: INFO : PUT result: OK Sep 13 00:03:56.272668 ignition[1206]: disks: disks passed Sep 13 00:03:56.272781 ignition[1206]: Ignition finished successfully Sep 13 00:03:56.276833 systemd[1]: Finished ignition-disks.service. Sep 13 00:03:56.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.293442 kernel: audit: type=1130 audit(1757721836.279:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.280817 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:03:56.291305 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:03:56.293450 systemd[1]: Reached target local-fs.target. Sep 13 00:03:56.293727 systemd[1]: Reached target sysinit.target. Sep 13 00:03:56.294013 systemd[1]: Reached target basic.target. Sep 13 00:03:56.296284 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:03:56.349157 systemd-fsck[1214]: ROOT: clean, 629/553520 files, 56027/553472 blocks Sep 13 00:03:56.356471 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:03:56.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.361948 systemd[1]: Mounting sysroot.mount... Sep 13 00:03:56.372115 kernel: audit: type=1130 audit(1757721836.355:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.391158 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:03:56.393235 systemd[1]: Mounted sysroot.mount. Sep 13 00:03:56.397088 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:03:56.410749 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:03:56.415317 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Sep 13 00:03:56.415621 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:03:56.415689 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:03:56.436693 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:03:56.457061 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:03:56.462925 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:03:56.483639 initrd-setup-root[1236]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:03:56.496478 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1231) Sep 13 00:03:56.502914 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:03:56.502987 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:03:56.505186 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:03:56.507074 initrd-setup-root[1245]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:03:56.527308 initrd-setup-root[1268]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:03:56.538184 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:03:56.539673 initrd-setup-root[1278]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:03:56.551120 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:03:56.789015 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:03:56.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.795987 systemd[1]: Starting ignition-mount.service... Sep 13 00:03:56.809588 systemd[1]: Starting sysroot-boot.service... Sep 13 00:03:56.822092 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 00:03:56.822348 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 00:03:56.857067 ignition[1297]: INFO : Ignition 2.14.0 Sep 13 00:03:56.857067 ignition[1297]: INFO : Stage: mount Sep 13 00:03:56.867060 ignition[1297]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:03:56.867060 ignition[1297]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:03:56.875258 systemd[1]: Finished sysroot-boot.service. Sep 13 00:03:56.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.889604 ignition[1297]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:03:56.892717 ignition[1297]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:03:56.896004 ignition[1297]: INFO : PUT result: OK Sep 13 00:03:56.902082 ignition[1297]: INFO : mount: mount passed Sep 13 00:03:56.904169 ignition[1297]: INFO : Ignition finished successfully Sep 13 00:03:56.907635 systemd[1]: Finished ignition-mount.service. Sep 13 00:03:56.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:56.909278 systemd[1]: Starting ignition-files.service... Sep 13 00:03:56.927668 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:03:56.957179 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1306) Sep 13 00:03:56.963044 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Sep 13 00:03:56.963110 kernel: BTRFS info (device nvme0n1p6): using free space tree Sep 13 00:03:56.965256 kernel: BTRFS info (device nvme0n1p6): has skinny extents Sep 13 00:03:56.979159 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Sep 13 00:03:56.984681 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:03:57.006001 ignition[1325]: INFO : Ignition 2.14.0 Sep 13 00:03:57.006001 ignition[1325]: INFO : Stage: files Sep 13 00:03:57.010994 ignition[1325]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:03:57.010994 ignition[1325]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:03:57.030031 ignition[1325]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:03:57.033318 ignition[1325]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:03:57.037539 ignition[1325]: INFO : PUT result: OK Sep 13 00:03:57.044148 ignition[1325]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:03:57.051802 ignition[1325]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:03:57.055505 ignition[1325]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:03:57.089496 ignition[1325]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:03:57.094597 ignition[1325]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:03:57.100016 unknown[1325]: wrote ssh authorized keys file for user: core Sep 13 00:03:57.102789 ignition[1325]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:03:57.102789 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-arm64.tar.gz" Sep 13 00:03:57.102789 ignition[1325]: INFO : GET https://get.helm.sh/helm-v3.17.3-linux-arm64.tar.gz: attempt #1 Sep 13 00:03:57.158408 systemd-networkd[1170]: eth0: Gained IPv6LL Sep 13 00:03:57.207443 ignition[1325]: INFO : GET result: OK Sep 13 00:03:57.389945 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-arm64.tar.gz" Sep 13 00:03:57.395031 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 13 00:03:57.399571 ignition[1325]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:03:57.415476 ignition[1325]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem96383634" Sep 13 00:03:57.418941 ignition[1325]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem96383634": device or resource busy Sep 13 00:03:57.418941 ignition[1325]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem96383634", trying btrfs: device or resource busy Sep 13 00:03:57.418941 ignition[1325]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem96383634" Sep 13 00:03:57.431378 ignition[1325]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem96383634" Sep 13 00:03:57.434720 ignition[1325]: INFO : op(3): [started] unmounting "/mnt/oem96383634" Sep 13 00:03:57.437412 ignition[1325]: INFO : op(3): [finished] unmounting "/mnt/oem96383634" Sep 13 00:03:57.437412 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Sep 13 00:03:57.437412 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:03:57.437412 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:03:57.437412 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 13 00:03:57.457258 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 13 00:03:57.457258 ignition[1325]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:03:57.524189 ignition[1325]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem863242349" Sep 13 00:03:57.524189 ignition[1325]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem863242349": device or resource busy Sep 13 00:03:57.524189 ignition[1325]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem863242349", trying btrfs: device or resource busy Sep 13 00:03:57.545512 ignition[1325]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem863242349" Sep 13 00:03:57.545512 ignition[1325]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem863242349" Sep 13 00:03:57.545512 ignition[1325]: INFO : op(6): [started] unmounting "/mnt/oem863242349" Sep 13 00:03:57.545512 ignition[1325]: INFO : op(6): [finished] unmounting "/mnt/oem863242349" Sep 13 00:03:57.545512 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Sep 13 00:03:57.545512 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 13 00:03:57.545512 ignition[1325]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:03:57.576587 ignition[1325]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2160177385" Sep 13 00:03:57.576587 ignition[1325]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2160177385": device or resource busy Sep 13 00:03:57.576587 ignition[1325]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2160177385", trying btrfs: device or resource busy Sep 13 00:03:57.576587 ignition[1325]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2160177385" Sep 13 00:03:57.576587 ignition[1325]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2160177385" Sep 13 00:03:57.576587 ignition[1325]: INFO : op(9): [started] unmounting "/mnt/oem2160177385" Sep 13 00:03:57.576587 ignition[1325]: INFO : op(9): [finished] unmounting "/mnt/oem2160177385" Sep 13 00:03:57.576587 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Sep 13 00:03:57.616171 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:03:57.616171 ignition[1325]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Sep 13 00:03:57.616171 ignition[1325]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem871078350" Sep 13 00:03:57.616171 ignition[1325]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem871078350": device or resource busy Sep 13 00:03:57.616171 ignition[1325]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem871078350", trying btrfs: device or resource busy Sep 13 00:03:57.616171 ignition[1325]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem871078350" Sep 13 00:03:57.616171 ignition[1325]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem871078350" Sep 13 00:03:57.616171 ignition[1325]: INFO : op(c): [started] unmounting "/mnt/oem871078350" Sep 13 00:03:57.616171 ignition[1325]: INFO : op(c): [finished] unmounting "/mnt/oem871078350" Sep 13 00:03:57.616171 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 00:03:57.616171 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 13 00:03:57.616171 ignition[1325]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 Sep 13 00:03:58.108009 ignition[1325]: INFO : GET result: OK Sep 13 00:03:58.755215 ignition[1325]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 13 00:03:58.755215 ignition[1325]: INFO : files: op(f): [started] processing unit "nvidia.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(f): [finished] processing unit "nvidia.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(11): [started] processing unit "amazon-ssm-agent.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(11): op(12): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(11): op(12): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(11): [finished] processing unit "amazon-ssm-agent.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Sep 13 00:03:58.763863 ignition[1325]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:03:58.798776 ignition[1325]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Sep 13 00:03:58.798776 ignition[1325]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Sep 13 00:03:58.798776 ignition[1325]: INFO : files: op(15): [started] setting preset to enabled for "nvidia.service" Sep 13 00:03:58.798776 ignition[1325]: INFO : files: op(15): [finished] setting preset to enabled for "nvidia.service" Sep 13 00:03:58.798776 ignition[1325]: INFO : files: op(16): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:03:58.818890 ignition[1325]: INFO : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:03:58.818890 ignition[1325]: INFO : files: op(17): [started] setting preset to enabled for "amazon-ssm-agent.service" Sep 13 00:03:58.818890 ignition[1325]: INFO : files: op(17): [finished] setting preset to enabled for "amazon-ssm-agent.service" Sep 13 00:03:58.818890 ignition[1325]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Sep 13 00:03:58.818890 ignition[1325]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Sep 13 00:03:58.847218 ignition[1325]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:03:58.847218 ignition[1325]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:03:58.847218 ignition[1325]: INFO : files: files passed Sep 13 00:03:58.847218 ignition[1325]: INFO : Ignition finished successfully Sep 13 00:03:58.865582 systemd[1]: Finished ignition-files.service. Sep 13 00:03:58.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:58.884985 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:03:58.888345 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:03:58.889833 systemd[1]: Starting ignition-quench.service... Sep 13 00:03:58.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:58.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:58.903306 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:03:58.903522 systemd[1]: Finished ignition-quench.service. Sep 13 00:03:58.925896 initrd-setup-root-after-ignition[1350]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:03:58.931849 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:03:58.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:58.935452 systemd[1]: Reached target ignition-complete.target. Sep 13 00:03:58.939836 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:03:58.976613 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:03:58.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:58.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:58.976855 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:03:58.982741 systemd[1]: Reached target initrd-fs.target. Sep 13 00:03:58.985285 systemd[1]: Reached target initrd.target. Sep 13 00:03:58.986082 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:03:58.987696 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:03:59.028995 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:03:59.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.030799 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:03:59.059828 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:03:59.064312 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:03:59.069674 systemd[1]: Stopped target timers.target. Sep 13 00:03:59.074408 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:03:59.074849 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:03:59.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.082032 systemd[1]: Stopped target initrd.target. Sep 13 00:03:59.086507 systemd[1]: Stopped target basic.target. Sep 13 00:03:59.091217 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:03:59.095891 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:03:59.100632 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:03:59.105091 systemd[1]: Stopped target remote-fs.target. Sep 13 00:03:59.109519 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:03:59.113976 systemd[1]: Stopped target sysinit.target. Sep 13 00:03:59.118430 systemd[1]: Stopped target local-fs.target. Sep 13 00:03:59.122507 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:03:59.126854 systemd[1]: Stopped target swap.target. Sep 13 00:03:59.131098 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:03:59.134277 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:03:59.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.139343 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:03:59.144047 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:03:59.147377 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:03:59.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.152500 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:03:59.156386 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:03:59.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.161786 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:03:59.164726 systemd[1]: Stopped ignition-files.service. Sep 13 00:03:59.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.171117 systemd[1]: Stopping ignition-mount.service... Sep 13 00:03:59.189716 ignition[1363]: INFO : Ignition 2.14.0 Sep 13 00:03:59.189716 ignition[1363]: INFO : Stage: umount Sep 13 00:03:59.189716 ignition[1363]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:03:59.189716 ignition[1363]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Sep 13 00:03:59.210539 iscsid[1175]: iscsid shutting down. Sep 13 00:03:59.201415 systemd[1]: Stopping iscsid.service... Sep 13 00:03:59.217873 ignition[1363]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Sep 13 00:03:59.217873 ignition[1363]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Sep 13 00:03:59.217873 ignition[1363]: INFO : PUT result: OK Sep 13 00:03:59.231655 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:03:59.231962 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:03:59.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.246811 ignition[1363]: INFO : umount: umount passed Sep 13 00:03:59.246811 ignition[1363]: INFO : Ignition finished successfully Sep 13 00:03:59.243383 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:03:59.258211 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:03:59.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.258686 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:03:59.270339 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:03:59.274591 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:03:59.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.284922 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:03:59.286500 systemd[1]: Stopped iscsid.service. Sep 13 00:03:59.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.295648 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:03:59.299982 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:03:59.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.300347 systemd[1]: Stopped ignition-mount.service. Sep 13 00:03:59.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.313512 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:03:59.313723 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:03:59.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.318552 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:03:59.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.318785 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:03:59.327990 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:03:59.328119 systemd[1]: Stopped ignition-disks.service. Sep 13 00:03:59.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.335572 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:03:59.335685 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:03:59.342180 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:03:59.342308 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:03:59.347429 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:03:59.347532 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:03:59.350320 systemd[1]: Stopped target paths.target. Sep 13 00:03:59.352568 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:03:59.356228 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:03:59.360338 systemd[1]: Stopped target slices.target. Sep 13 00:03:59.362528 systemd[1]: Stopped target sockets.target. Sep 13 00:03:59.364918 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:03:59.365594 systemd[1]: Closed iscsid.socket. Sep 13 00:03:59.369033 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:03:59.369164 systemd[1]: Stopped ignition-setup.service. Sep 13 00:03:59.371624 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:03:59.371717 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:03:59.375560 systemd[1]: Stopping iscsiuio.service... Sep 13 00:03:59.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.424715 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:03:59.424931 systemd[1]: Stopped iscsiuio.service. Sep 13 00:03:59.427458 systemd[1]: Stopped target network.target. Sep 13 00:03:59.430204 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:03:59.430294 systemd[1]: Closed iscsiuio.socket. Sep 13 00:03:59.433106 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:03:59.437874 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:03:59.444260 systemd-networkd[1170]: eth0: DHCPv6 lease lost Sep 13 00:03:59.446052 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:03:59.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.467000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:03:59.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.477000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:03:59.446369 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:03:59.467889 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:03:59.468173 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:03:59.475304 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:03:59.475381 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:03:59.479312 systemd[1]: Stopping network-cleanup.service... Sep 13 00:03:59.498484 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:03:59.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.498644 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:03:59.501610 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:03:59.501722 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:03:59.507941 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:03:59.508048 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:03:59.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.528391 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:03:59.537588 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:03:59.548060 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:03:59.548421 systemd[1]: Stopped network-cleanup.service. Sep 13 00:03:59.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.560885 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:03:59.564890 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:03:59.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.570170 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:03:59.570298 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:03:59.570488 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:03:59.570556 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:03:59.577802 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:03:59.577909 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:03:59.580626 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:03:59.580736 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:03:59.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.595885 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:03:59.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.595988 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:03:59.599763 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:03:59.614381 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:03:59.617819 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:03:59.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.625659 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:03:59.629090 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:03:59.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:03:59.634939 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:03:59.641860 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:03:59.662209 systemd[1]: Switching root. Sep 13 00:03:59.689779 systemd-journald[309]: Journal stopped Sep 13 00:04:05.752098 systemd-journald[309]: Received SIGTERM from PID 1 (systemd). Sep 13 00:04:05.752259 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:04:05.752306 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:04:05.752339 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:04:05.752370 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:04:05.752402 kernel: SELinux: policy capability open_perms=1 Sep 13 00:04:05.752441 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:04:05.752479 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:04:05.752511 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:04:05.752542 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:04:05.752580 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:04:05.752615 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:04:05.752657 systemd[1]: Successfully loaded SELinux policy in 134.682ms. Sep 13 00:04:05.752708 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.770ms. Sep 13 00:04:05.752745 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:04:05.752782 systemd[1]: Detected virtualization amazon. Sep 13 00:04:05.752814 systemd[1]: Detected architecture arm64. Sep 13 00:04:05.752848 systemd[1]: Detected first boot. Sep 13 00:04:05.752880 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:04:05.752912 kernel: kauditd_printk_skb: 46 callbacks suppressed Sep 13 00:04:05.752946 kernel: audit: type=1400 audit(1757721840.834:77): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:04:05.752980 kernel: audit: type=1400 audit(1757721840.836:78): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:04:05.753015 kernel: audit: type=1334 audit(1757721840.836:79): prog-id=10 op=LOAD Sep 13 00:04:05.753044 kernel: audit: type=1334 audit(1757721840.836:80): prog-id=10 op=UNLOAD Sep 13 00:04:05.753084 kernel: audit: type=1334 audit(1757721840.844:81): prog-id=11 op=LOAD Sep 13 00:04:05.753114 kernel: audit: type=1334 audit(1757721840.844:82): prog-id=11 op=UNLOAD Sep 13 00:04:05.753167 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:04:05.753204 kernel: audit: type=1400 audit(1757721841.100:83): avc: denied { associate } for pid=1396 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:04:05.753238 kernel: audit: type=1300 audit(1757721841.100:83): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1379 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:05.753275 kernel: audit: type=1327 audit(1757721841.100:83): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:04:05.753309 kernel: audit: type=1400 audit(1757721841.104:84): avc: denied { associate } for pid=1396 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:04:05.753341 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:04:05.753379 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:04:05.753412 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:04:05.753448 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:04:05.753848 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:04:05.753906 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:04:05.753941 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:04:05.753975 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:04:05.754006 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:04:05.754037 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 13 00:04:05.754070 systemd[1]: Created slice system-getty.slice. Sep 13 00:04:05.754103 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:04:05.754645 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:04:05.754684 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:04:05.754718 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:04:05.754751 systemd[1]: Created slice user.slice. Sep 13 00:04:05.754782 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:04:05.754813 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:04:05.754845 systemd[1]: Set up automount boot.automount. Sep 13 00:04:05.754877 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:04:05.754907 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:04:05.754941 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:04:05.754971 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:04:05.755001 systemd[1]: Reached target integritysetup.target. Sep 13 00:04:05.755030 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:04:05.755062 systemd[1]: Reached target remote-fs.target. Sep 13 00:04:05.755093 systemd[1]: Reached target slices.target. Sep 13 00:04:05.755145 systemd[1]: Reached target swap.target. Sep 13 00:04:05.755184 systemd[1]: Reached target torcx.target. Sep 13 00:04:05.755220 systemd[1]: Reached target veritysetup.target. Sep 13 00:04:05.755252 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:04:05.755288 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:04:05.755319 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:04:05.755349 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:04:05.755381 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:04:05.755411 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:04:05.755446 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:04:05.755478 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:04:05.755508 systemd[1]: Mounting media.mount... Sep 13 00:04:05.755538 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:04:05.755571 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:04:05.755602 systemd[1]: Mounting tmp.mount... Sep 13 00:04:05.755632 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:04:05.755662 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:04:05.755692 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:04:05.755723 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:04:05.755753 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:04:05.755784 systemd[1]: Starting modprobe@drm.service... Sep 13 00:04:05.755816 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:04:05.755850 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:04:05.755880 systemd[1]: Starting modprobe@loop.service... Sep 13 00:04:05.755914 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:04:05.755946 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:04:05.755976 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:04:05.756006 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:04:05.756036 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:04:05.756066 systemd[1]: Stopped systemd-journald.service. Sep 13 00:04:05.756096 systemd[1]: Starting systemd-journald.service... Sep 13 00:04:05.756147 kernel: fuse: init (API version 7.34) Sep 13 00:04:05.756183 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:04:05.756213 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:04:05.756243 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:04:05.756275 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:04:05.756306 kernel: loop: module loaded Sep 13 00:04:05.756337 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:04:05.756367 systemd[1]: Stopped verity-setup.service. Sep 13 00:04:05.756402 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:04:05.756436 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:04:05.756467 systemd[1]: Mounted media.mount. Sep 13 00:04:05.756497 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:04:05.756530 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:04:05.756562 systemd[1]: Mounted tmp.mount. Sep 13 00:04:05.756595 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:04:05.756626 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:04:05.756685 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:04:05.756722 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:04:05.756765 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:04:05.756878 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:04:05.766203 systemd[1]: Finished modprobe@drm.service. Sep 13 00:04:05.766270 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:04:05.766302 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:04:05.766342 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:04:05.766377 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:04:05.766409 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:04:05.766440 systemd[1]: Finished modprobe@loop.service. Sep 13 00:04:05.766470 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:04:05.766503 systemd-journald[1474]: Journal started Sep 13 00:04:05.766610 systemd-journald[1474]: Runtime Journal (/run/log/journal/ec251532cd627905e174621ba488d902) is 8.0M, max 75.4M, 67.4M free. Sep 13 00:04:05.766677 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:04:00.635000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:04:00.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:04:00.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:04:00.836000 audit: BPF prog-id=10 op=LOAD Sep 13 00:04:00.836000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:04:00.844000 audit: BPF prog-id=11 op=LOAD Sep 13 00:04:00.844000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:04:01.100000 audit[1396]: AVC avc: denied { associate } for pid=1396 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:04:01.100000 audit[1396]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458b4 a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1379 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:01.100000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:04:01.104000 audit[1396]: AVC avc: denied { associate } for pid=1396 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:04:01.104000 audit[1396]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145989 a2=1ed a3=0 items=2 ppid=1379 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:01.104000 audit: CWD cwd="/" Sep 13 00:04:01.104000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:04:01.104000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:04:01.104000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:04:05.263000 audit: BPF prog-id=12 op=LOAD Sep 13 00:04:05.263000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:04:05.263000 audit: BPF prog-id=13 op=LOAD Sep 13 00:04:05.263000 audit: BPF prog-id=14 op=LOAD Sep 13 00:04:05.263000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:04:05.263000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:04:05.264000 audit: BPF prog-id=15 op=LOAD Sep 13 00:04:05.264000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:04:05.265000 audit: BPF prog-id=16 op=LOAD Sep 13 00:04:05.265000 audit: BPF prog-id=17 op=LOAD Sep 13 00:04:05.265000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:04:05.265000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:04:05.267000 audit: BPF prog-id=18 op=LOAD Sep 13 00:04:05.267000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:04:05.267000 audit: BPF prog-id=19 op=LOAD Sep 13 00:04:05.267000 audit: BPF prog-id=20 op=LOAD Sep 13 00:04:05.267000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:04:05.267000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:04:05.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.276000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:04:05.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.587000 audit: BPF prog-id=21 op=LOAD Sep 13 00:04:05.587000 audit: BPF prog-id=22 op=LOAD Sep 13 00:04:05.587000 audit: BPF prog-id=23 op=LOAD Sep 13 00:04:05.587000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:04:05.587000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:04:05.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.747000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:04:05.747000 audit[1474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffe8f70f00 a2=4000 a3=1 items=0 ppid=1 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:05.747000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:04:05.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.260854 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:04:01.088577 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:04:05.260878 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Sep 13 00:04:01.090100 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:04:05.270525 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:04:01.090212 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:04:01.090291 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:04:01.090319 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:04:01.090397 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:04:01.090430 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:04:01.090907 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:04:01.091013 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:04:01.091051 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:04:01.099763 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:04:05.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:01.099856 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:04:05.785558 systemd[1]: Started systemd-journald.service. Sep 13 00:04:05.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:01.100188 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:04:05.781537 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:04:01.100234 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:04:05.784970 systemd[1]: Reached target network-pre.target. Sep 13 00:04:01.100291 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:04:01.100331 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:04:04.368412 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:04Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:04:04.369329 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:04Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:04:04.369599 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:04Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:04:04.370253 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:04Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:04:04.370403 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:04Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:04:04.370628 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-09-13T00:04:04Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:04:05.789290 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:04:05.795122 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:04:05.797344 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:04:05.801869 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:04:05.811490 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:04:05.815548 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:04:05.820395 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:04:05.826580 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:04:05.829993 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:04:05.844006 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:04:05.847350 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:04:05.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.882586 systemd-journald[1474]: Time spent on flushing to /var/log/journal/ec251532cd627905e174621ba488d902 is 76.118ms for 1135 entries. Sep 13 00:04:05.882586 systemd-journald[1474]: System Journal (/var/log/journal/ec251532cd627905e174621ba488d902) is 8.0M, max 195.6M, 187.6M free. Sep 13 00:04:06.014057 kernel: kauditd_printk_skb: 57 callbacks suppressed Sep 13 00:04:06.014277 kernel: audit: type=1130 audit(1757721845.878:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.014353 systemd-journald[1474]: Received client request to flush runtime journal. Sep 13 00:04:06.014435 kernel: audit: type=1130 audit(1757721845.899:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.014492 kernel: audit: type=1130 audit(1757721845.948:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:05.876474 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:04:05.881870 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:04:05.897636 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:04:05.900728 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:04:05.947120 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:04:06.017415 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:04:06.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.034207 kernel: audit: type=1130 audit(1757721846.019:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.066723 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:04:06.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.073589 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:04:06.083261 kernel: audit: type=1130 audit(1757721846.069:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.103377 udevadm[1515]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 13 00:04:06.148541 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:04:06.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.165200 kernel: audit: type=1130 audit(1757721846.153:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.866594 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:04:06.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.878229 kernel: audit: type=1130 audit(1757721846.868:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.879000 audit: BPF prog-id=24 op=LOAD Sep 13 00:04:06.879000 audit: BPF prog-id=25 op=LOAD Sep 13 00:04:06.881579 systemd[1]: Starting systemd-udevd.service... Sep 13 00:04:06.888605 kernel: audit: type=1334 audit(1757721846.879:142): prog-id=24 op=LOAD Sep 13 00:04:06.889284 kernel: audit: type=1334 audit(1757721846.879:143): prog-id=25 op=LOAD Sep 13 00:04:06.889344 kernel: audit: type=1334 audit(1757721846.879:144): prog-id=7 op=UNLOAD Sep 13 00:04:06.879000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:04:06.879000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:04:06.928522 systemd-udevd[1516]: Using default interface naming scheme 'v252'. Sep 13 00:04:06.987641 systemd[1]: Started systemd-udevd.service. Sep 13 00:04:06.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:06.993000 audit: BPF prog-id=26 op=LOAD Sep 13 00:04:06.995676 systemd[1]: Starting systemd-networkd.service... Sep 13 00:04:07.005000 audit: BPF prog-id=27 op=LOAD Sep 13 00:04:07.006000 audit: BPF prog-id=28 op=LOAD Sep 13 00:04:07.006000 audit: BPF prog-id=29 op=LOAD Sep 13 00:04:07.008825 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:04:07.123741 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:04:07.160272 (udev-worker)[1525]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:04:07.163017 systemd[1]: Started systemd-userdbd.service. Sep 13 00:04:07.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:07.387999 systemd-networkd[1518]: lo: Link UP Sep 13 00:04:07.388029 systemd-networkd[1518]: lo: Gained carrier Sep 13 00:04:07.389261 systemd-networkd[1518]: Enumeration completed Sep 13 00:04:07.389451 systemd[1]: Started systemd-networkd.service. Sep 13 00:04:07.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:07.390049 systemd-networkd[1518]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:04:07.394754 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:04:07.405244 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:04:07.405469 systemd-networkd[1518]: eth0: Link UP Sep 13 00:04:07.405849 systemd-networkd[1518]: eth0: Gained carrier Sep 13 00:04:07.426594 systemd-networkd[1518]: eth0: DHCPv4 address 172.31.27.21/20, gateway 172.31.16.1 acquired from 172.31.16.1 Sep 13 00:04:07.618668 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:04:07.622317 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:04:07.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:07.627440 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:04:07.696776 lvm[1635]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:04:07.747700 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:04:07.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:07.750471 systemd[1]: Reached target cryptsetup.target. Sep 13 00:04:07.756954 systemd[1]: Starting lvm2-activation.service... Sep 13 00:04:07.766545 lvm[1636]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:04:07.802050 systemd[1]: Finished lvm2-activation.service. Sep 13 00:04:07.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:07.804884 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:04:07.807191 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:04:07.807255 systemd[1]: Reached target local-fs.target. Sep 13 00:04:07.809633 systemd[1]: Reached target machines.target. Sep 13 00:04:07.814484 systemd[1]: Starting ldconfig.service... Sep 13 00:04:07.817805 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:04:07.817955 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:04:07.820554 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:04:07.826492 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:04:07.834042 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:04:07.841044 systemd[1]: Starting systemd-sysext.service... Sep 13 00:04:07.850767 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1638 (bootctl) Sep 13 00:04:07.853839 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:04:07.885375 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:04:07.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:07.905804 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:04:07.919461 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:04:07.919882 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:04:07.944229 kernel: loop0: detected capacity change from 0 to 211168 Sep 13 00:04:08.026461 systemd-fsck[1648]: fsck.fat 4.2 (2021-01-31) Sep 13 00:04:08.026461 systemd-fsck[1648]: /dev/nvme0n1p1: 236 files, 117310/258078 clusters Sep 13 00:04:08.031707 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:04:08.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.037619 systemd[1]: Mounting boot.mount... Sep 13 00:04:08.065465 systemd[1]: Mounted boot.mount. Sep 13 00:04:08.109648 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:04:08.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.185196 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:04:08.186488 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:04:08.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.257193 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:04:08.287218 kernel: loop1: detected capacity change from 0 to 211168 Sep 13 00:04:08.304972 (sd-sysext)[1663]: Using extensions 'kubernetes'. Sep 13 00:04:08.306662 (sd-sysext)[1663]: Merged extensions into '/usr'. Sep 13 00:04:08.356666 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:04:08.366328 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:04:08.370316 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:04:08.379384 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:04:08.386784 systemd[1]: Starting modprobe@loop.service... Sep 13 00:04:08.390099 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:04:08.390484 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:04:08.397304 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:04:08.400238 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:04:08.400609 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:04:08.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.403912 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:04:08.404238 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:04:08.407538 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:04:08.407838 systemd[1]: Finished modprobe@loop.service. Sep 13 00:04:08.411244 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:04:08.411498 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:04:08.413829 systemd[1]: Finished systemd-sysext.service. Sep 13 00:04:08.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:08.419217 systemd[1]: Starting ensure-sysext.service... Sep 13 00:04:08.423751 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:04:08.439777 systemd[1]: Reloading. Sep 13 00:04:08.509210 systemd-tmpfiles[1670]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:04:08.537405 systemd-tmpfiles[1670]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:04:08.569981 /usr/lib/systemd/system-generators/torcx-generator[1689]: time="2025-09-13T00:04:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:04:08.572954 systemd-tmpfiles[1670]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:04:08.578373 /usr/lib/systemd/system-generators/torcx-generator[1689]: time="2025-09-13T00:04:08Z" level=info msg="torcx already run" Sep 13 00:04:08.831669 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:04:08.831726 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:04:08.892342 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:04:09.062366 systemd-networkd[1518]: eth0: Gained IPv6LL Sep 13 00:04:09.095000 audit: BPF prog-id=30 op=LOAD Sep 13 00:04:09.095000 audit: BPF prog-id=31 op=LOAD Sep 13 00:04:09.096000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:04:09.096000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:04:09.100000 audit: BPF prog-id=32 op=LOAD Sep 13 00:04:09.100000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:04:09.108000 audit: BPF prog-id=33 op=LOAD Sep 13 00:04:09.108000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:04:09.109000 audit: BPF prog-id=34 op=LOAD Sep 13 00:04:09.109000 audit: BPF prog-id=35 op=LOAD Sep 13 00:04:09.109000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:04:09.109000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:04:09.111000 audit: BPF prog-id=36 op=LOAD Sep 13 00:04:09.112000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:04:09.112000 audit: BPF prog-id=37 op=LOAD Sep 13 00:04:09.112000 audit: BPF prog-id=38 op=LOAD Sep 13 00:04:09.113000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:04:09.113000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:04:09.124969 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:04:09.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.130582 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:04:09.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.143751 systemd[1]: Starting audit-rules.service... Sep 13 00:04:09.148727 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:04:09.155345 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:04:09.161000 audit: BPF prog-id=39 op=LOAD Sep 13 00:04:09.171000 audit: BPF prog-id=40 op=LOAD Sep 13 00:04:09.210000 audit[1751]: SYSTEM_BOOT pid=1751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.164472 systemd[1]: Starting systemd-resolved.service... Sep 13 00:04:09.174739 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:04:09.181523 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:04:09.211250 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.215633 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:04:09.220500 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:04:09.225357 systemd[1]: Starting modprobe@loop.service... Sep 13 00:04:09.227469 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.227825 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:04:09.240037 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.240453 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.240669 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:04:09.250037 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:04:09.253871 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.256733 systemd[1]: Starting modprobe@drm.service... Sep 13 00:04:09.259643 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.260074 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:04:09.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.264475 systemd[1]: Finished ensure-sysext.service. Sep 13 00:04:09.275034 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:04:09.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.277978 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:04:09.285492 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:04:09.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.285810 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:04:09.298418 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:04:09.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.298768 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:04:09.301748 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:04:09.312348 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:04:09.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.312702 systemd[1]: Finished modprobe@loop.service. Sep 13 00:04:09.315830 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.318581 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:04:09.318884 systemd[1]: Finished modprobe@drm.service. Sep 13 00:04:09.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.327105 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:04:09.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.384684 ldconfig[1637]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:04:09.398440 systemd[1]: Finished ldconfig.service. Sep 13 00:04:09.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.407448 systemd[1]: Starting systemd-update-done.service... Sep 13 00:04:09.440973 systemd[1]: Finished systemd-update-done.service. Sep 13 00:04:09.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:09.471000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:04:09.471000 audit[1771]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdef91930 a2=420 a3=0 items=0 ppid=1746 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:09.471000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:04:09.474217 augenrules[1771]: No rules Sep 13 00:04:09.475802 systemd[1]: Finished audit-rules.service. Sep 13 00:04:09.484445 systemd-resolved[1749]: Positive Trust Anchors: Sep 13 00:04:09.484481 systemd-resolved[1749]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:04:09.484533 systemd-resolved[1749]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:04:09.493225 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:04:09.495686 systemd[1]: Reached target time-set.target. Sep 13 00:04:09.099200 systemd-timesyncd[1750]: Contacted time server 23.186.168.130:123 (0.flatcar.pool.ntp.org). Sep 13 00:04:09.150081 systemd-journald[1474]: Time jumped backwards, rotating. Sep 13 00:04:09.102380 systemd-timesyncd[1750]: Initial clock synchronization to Sat 2025-09-13 00:04:09.098756 UTC. Sep 13 00:04:09.124572 systemd-resolved[1749]: Defaulting to hostname 'linux'. Sep 13 00:04:09.128107 systemd[1]: Started systemd-resolved.service. Sep 13 00:04:09.130297 systemd[1]: Reached target network.target. Sep 13 00:04:09.132188 systemd[1]: Reached target network-online.target. Sep 13 00:04:09.134255 systemd[1]: Reached target nss-lookup.target. Sep 13 00:04:09.138041 systemd[1]: Reached target sysinit.target. Sep 13 00:04:09.141941 systemd[1]: Started motdgen.path. Sep 13 00:04:09.143716 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:04:09.146673 systemd[1]: Started logrotate.timer. Sep 13 00:04:09.150200 systemd[1]: Started mdadm.timer. Sep 13 00:04:09.153433 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:04:09.157586 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:04:09.157647 systemd[1]: Reached target paths.target. Sep 13 00:04:09.160385 systemd[1]: Reached target timers.target. Sep 13 00:04:09.162782 systemd[1]: Listening on dbus.socket. Sep 13 00:04:09.168467 systemd[1]: Starting docker.socket... Sep 13 00:04:09.177970 systemd[1]: Listening on sshd.socket. Sep 13 00:04:09.180431 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:04:09.181751 systemd[1]: Listening on docker.socket. Sep 13 00:04:09.185344 systemd[1]: Reached target sockets.target. Sep 13 00:04:09.187727 systemd[1]: Reached target basic.target. Sep 13 00:04:09.190356 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.190701 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:04:09.193583 systemd[1]: Started amazon-ssm-agent.service. Sep 13 00:04:09.202846 systemd[1]: Starting containerd.service... Sep 13 00:04:09.207362 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 13 00:04:09.215886 systemd[1]: Starting dbus.service... Sep 13 00:04:09.220039 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:04:09.227750 systemd[1]: Starting extend-filesystems.service... Sep 13 00:04:09.230391 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:04:09.233653 systemd[1]: Starting kubelet.service... Sep 13 00:04:09.239156 systemd[1]: Starting motdgen.service... Sep 13 00:04:09.244471 systemd[1]: Started nvidia.service. Sep 13 00:04:09.255759 systemd[1]: Starting prepare-helm.service... Sep 13 00:04:09.265760 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:04:09.276057 systemd[1]: Starting sshd-keygen.service... Sep 13 00:04:09.294984 systemd[1]: Starting systemd-logind.service... Sep 13 00:04:09.297801 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:04:09.297970 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:04:09.299752 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:04:09.312566 systemd[1]: Starting update-engine.service... Sep 13 00:04:09.319120 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:04:09.373706 jq[1784]: false Sep 13 00:04:09.388703 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:04:09.443138 jq[1796]: true Sep 13 00:04:09.389230 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:04:09.423448 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:04:09.423875 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:04:09.456042 jq[1804]: true Sep 13 00:04:09.517989 tar[1799]: linux-arm64/LICENSE Sep 13 00:04:09.518536 tar[1799]: linux-arm64/helm Sep 13 00:04:09.554950 extend-filesystems[1785]: Found loop1 Sep 13 00:04:09.558269 dbus-daemon[1783]: [system] SELinux support is enabled Sep 13 00:04:09.561979 systemd[1]: Started dbus.service. Sep 13 00:04:09.564570 extend-filesystems[1785]: Found nvme0n1 Sep 13 00:04:09.569317 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:04:09.569375 systemd[1]: Reached target system-config.target. Sep 13 00:04:09.573465 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:04:09.573540 systemd[1]: Reached target user-config.target. Sep 13 00:04:09.577575 extend-filesystems[1785]: Found nvme0n1p1 Sep 13 00:04:09.583185 extend-filesystems[1785]: Found nvme0n1p2 Sep 13 00:04:09.588435 extend-filesystems[1785]: Found nvme0n1p3 Sep 13 00:04:09.592131 dbus-daemon[1783]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1518 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Sep 13 00:04:09.592542 extend-filesystems[1785]: Found usr Sep 13 00:04:09.599444 extend-filesystems[1785]: Found nvme0n1p4 Sep 13 00:04:09.605933 extend-filesystems[1785]: Found nvme0n1p6 Sep 13 00:04:09.608423 extend-filesystems[1785]: Found nvme0n1p7 Sep 13 00:04:09.611718 dbus-daemon[1783]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 00:04:09.620824 extend-filesystems[1785]: Found nvme0n1p9 Sep 13 00:04:09.623484 systemd[1]: Starting systemd-hostnamed.service... Sep 13 00:04:09.627426 extend-filesystems[1785]: Checking size of /dev/nvme0n1p9 Sep 13 00:04:09.710733 extend-filesystems[1785]: Resized partition /dev/nvme0n1p9 Sep 13 00:04:09.728374 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:04:09.728859 systemd[1]: Finished motdgen.service. Sep 13 00:04:09.745069 extend-filesystems[1840]: resize2fs 1.46.5 (30-Dec-2021) Sep 13 00:04:09.772710 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Sep 13 00:04:09.854544 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Sep 13 00:04:09.857499 update_engine[1795]: I0913 00:04:09.856750 1795 main.cc:92] Flatcar Update Engine starting Sep 13 00:04:09.877747 systemd[1]: Started update-engine.service. Sep 13 00:04:09.883141 systemd-logind[1793]: Watching system buttons on /dev/input/event0 (Power Button) Sep 13 00:04:09.883191 systemd-logind[1793]: Watching system buttons on /dev/input/event1 (Sleep Button) Sep 13 00:04:09.883725 systemd[1]: Started locksmithd.service. Sep 13 00:04:09.884934 extend-filesystems[1840]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Sep 13 00:04:09.884934 extend-filesystems[1840]: old_desc_blocks = 1, new_desc_blocks = 1 Sep 13 00:04:09.884934 extend-filesystems[1840]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Sep 13 00:04:09.914710 extend-filesystems[1785]: Resized filesystem in /dev/nvme0n1p9 Sep 13 00:04:09.917736 bash[1844]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:04:09.885452 systemd-logind[1793]: New seat seat0. Sep 13 00:04:09.918023 update_engine[1795]: I0913 00:04:09.892977 1795 update_check_scheduler.cc:74] Next update check in 7m48s Sep 13 00:04:09.889807 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:04:09.890220 systemd[1]: Finished extend-filesystems.service. Sep 13 00:04:09.906231 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:04:09.922275 systemd[1]: Started systemd-logind.service. Sep 13 00:04:09.929437 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 00:04:09.990564 amazon-ssm-agent[1780]: 2025/09/13 00:04:09 Failed to load instance info from vault. RegistrationKey does not exist. Sep 13 00:04:10.022046 amazon-ssm-agent[1780]: Initializing new seelog logger Sep 13 00:04:10.042631 amazon-ssm-agent[1780]: New Seelog Logger Creation Complete Sep 13 00:04:10.042900 amazon-ssm-agent[1780]: 2025/09/13 00:04:10 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Sep 13 00:04:10.042900 amazon-ssm-agent[1780]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Sep 13 00:04:10.043396 amazon-ssm-agent[1780]: 2025/09/13 00:04:10 processing appconfig overrides Sep 13 00:04:10.153689 env[1800]: time="2025-09-13T00:04:10.153491229Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:04:10.322380 dbus-daemon[1783]: [system] Successfully activated service 'org.freedesktop.hostname1' Sep 13 00:04:10.322730 systemd[1]: Started systemd-hostnamed.service. Sep 13 00:04:10.331900 dbus-daemon[1783]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1827 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Sep 13 00:04:10.337548 systemd[1]: Starting polkit.service... Sep 13 00:04:10.357733 coreos-metadata[1782]: Sep 13 00:04:10.343 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Sep 13 00:04:10.368958 coreos-metadata[1782]: Sep 13 00:04:10.368 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Sep 13 00:04:10.373764 coreos-metadata[1782]: Sep 13 00:04:10.373 INFO Fetch successful Sep 13 00:04:10.374088 coreos-metadata[1782]: Sep 13 00:04:10.373 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Sep 13 00:04:10.378343 coreos-metadata[1782]: Sep 13 00:04:10.378 INFO Fetch successful Sep 13 00:04:10.382903 unknown[1782]: wrote ssh authorized keys file for user: core Sep 13 00:04:10.384437 env[1800]: time="2025-09-13T00:04:10.384365650Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:04:10.392903 env[1800]: time="2025-09-13T00:04:10.387336646Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:04:10.399666 polkitd[1873]: Started polkitd version 121 Sep 13 00:04:10.421684 env[1800]: time="2025-09-13T00:04:10.410446355Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:04:10.421684 env[1800]: time="2025-09-13T00:04:10.410732087Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:04:10.426689 env[1800]: time="2025-09-13T00:04:10.422444111Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:04:10.428108 env[1800]: time="2025-09-13T00:04:10.428037995Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:04:10.428336 env[1800]: time="2025-09-13T00:04:10.428290775Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:04:10.430564 env[1800]: time="2025-09-13T00:04:10.428483975Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:04:10.432099 env[1800]: time="2025-09-13T00:04:10.432037643Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:04:10.432913 update-ssh-keys[1879]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:04:10.434020 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 13 00:04:10.438324 env[1800]: time="2025-09-13T00:04:10.438045023Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:04:10.439341 env[1800]: time="2025-09-13T00:04:10.439273895Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:04:10.441683 env[1800]: time="2025-09-13T00:04:10.441622115Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:04:10.443675 env[1800]: time="2025-09-13T00:04:10.442456679Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:04:10.448653 env[1800]: time="2025-09-13T00:04:10.448588775Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:04:10.461734 env[1800]: time="2025-09-13T00:04:10.461602139Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:04:10.461734 env[1800]: time="2025-09-13T00:04:10.461701391Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:04:10.461985 env[1800]: time="2025-09-13T00:04:10.461737259Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:04:10.461985 env[1800]: time="2025-09-13T00:04:10.461839619Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.461985 env[1800]: time="2025-09-13T00:04:10.461881967Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.461985 env[1800]: time="2025-09-13T00:04:10.461915783Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.461985 env[1800]: time="2025-09-13T00:04:10.461951135Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.462763 env[1800]: time="2025-09-13T00:04:10.462697547Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.462871 env[1800]: time="2025-09-13T00:04:10.462771959Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.462871 env[1800]: time="2025-09-13T00:04:10.462809027Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.462871 env[1800]: time="2025-09-13T00:04:10.462842159Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.463119 env[1800]: time="2025-09-13T00:04:10.462872471Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:04:10.463183 env[1800]: time="2025-09-13T00:04:10.463124903Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:04:10.463379 env[1800]: time="2025-09-13T00:04:10.463316507Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:04:10.464135 env[1800]: time="2025-09-13T00:04:10.464068715Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:04:10.464250 env[1800]: time="2025-09-13T00:04:10.464148491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.464250 env[1800]: time="2025-09-13T00:04:10.464184167Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:04:10.464555 env[1800]: time="2025-09-13T00:04:10.464437775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.464628 env[1800]: time="2025-09-13T00:04:10.464608715Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.464685 env[1800]: time="2025-09-13T00:04:10.464645471Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.464742 env[1800]: time="2025-09-13T00:04:10.464677295Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.464742 env[1800]: time="2025-09-13T00:04:10.464710571Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.464839 env[1800]: time="2025-09-13T00:04:10.464741183Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.464839 env[1800]: time="2025-09-13T00:04:10.464770955Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.464839 env[1800]: time="2025-09-13T00:04:10.464799347Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.465011 env[1800]: time="2025-09-13T00:04:10.464833079Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:04:10.465176 env[1800]: time="2025-09-13T00:04:10.465123083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.465266 env[1800]: time="2025-09-13T00:04:10.465177311Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.465266 env[1800]: time="2025-09-13T00:04:10.465211127Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.465266 env[1800]: time="2025-09-13T00:04:10.465243635Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:04:10.465413 env[1800]: time="2025-09-13T00:04:10.465277811Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:04:10.465413 env[1800]: time="2025-09-13T00:04:10.465310007Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:04:10.465413 env[1800]: time="2025-09-13T00:04:10.465345275Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:04:10.465592 env[1800]: time="2025-09-13T00:04:10.465414695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:04:10.465933 env[1800]: time="2025-09-13T00:04:10.465805247Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:04:10.468049 env[1800]: time="2025-09-13T00:04:10.465937199Z" level=info msg="Connect containerd service" Sep 13 00:04:10.468049 env[1800]: time="2025-09-13T00:04:10.466000223Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:04:10.475134 polkitd[1873]: Loading rules from directory /etc/polkit-1/rules.d Sep 13 00:04:10.476341 polkitd[1873]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 13 00:04:10.476545 env[1800]: time="2025-09-13T00:04:10.476354111Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:04:10.476633 env[1800]: time="2025-09-13T00:04:10.476566091Z" level=info msg="Start subscribing containerd event" Sep 13 00:04:10.476750 env[1800]: time="2025-09-13T00:04:10.476636195Z" level=info msg="Start recovering state" Sep 13 00:04:10.476814 env[1800]: time="2025-09-13T00:04:10.476751815Z" level=info msg="Start event monitor" Sep 13 00:04:10.476814 env[1800]: time="2025-09-13T00:04:10.476797523Z" level=info msg="Start snapshots syncer" Sep 13 00:04:10.476950 env[1800]: time="2025-09-13T00:04:10.476821067Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:04:10.476950 env[1800]: time="2025-09-13T00:04:10.476842583Z" level=info msg="Start streaming server" Sep 13 00:04:10.477886 env[1800]: time="2025-09-13T00:04:10.477775619Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:04:10.479497 env[1800]: time="2025-09-13T00:04:10.479417027Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:04:10.479795 systemd[1]: Started containerd.service. Sep 13 00:04:10.485418 env[1800]: time="2025-09-13T00:04:10.485311595Z" level=info msg="containerd successfully booted in 0.352386s" Sep 13 00:04:10.492222 polkitd[1873]: Finished loading, compiling and executing 2 rules Sep 13 00:04:10.495244 dbus-daemon[1783]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Sep 13 00:04:10.495564 systemd[1]: Started polkit.service. Sep 13 00:04:10.499332 polkitd[1873]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 13 00:04:10.573927 systemd-hostnamed[1827]: Hostname set to (transient) Sep 13 00:04:10.574125 systemd-resolved[1749]: System hostname changed to 'ip-172-31-27-21'. Sep 13 00:04:10.956542 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Create new startup processor Sep 13 00:04:10.956909 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [LongRunningPluginsManager] registered plugins: {} Sep 13 00:04:10.957041 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Initializing bookkeeping folders Sep 13 00:04:10.957041 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO removing the completed state files Sep 13 00:04:10.957041 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Initializing bookkeeping folders for long running plugins Sep 13 00:04:10.957041 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Sep 13 00:04:10.957227 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Initializing healthcheck folders for long running plugins Sep 13 00:04:10.957227 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Initializing locations for inventory plugin Sep 13 00:04:10.957227 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Initializing default location for custom inventory Sep 13 00:04:10.957227 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Initializing default location for file inventory Sep 13 00:04:10.957227 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Initializing default location for role inventory Sep 13 00:04:10.957227 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Init the cloudwatchlogs publisher Sep 13 00:04:10.957553 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:runDocument Sep 13 00:04:10.957553 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:softwareInventory Sep 13 00:04:10.957553 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:updateSsmAgent Sep 13 00:04:10.957553 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:runDockerAction Sep 13 00:04:10.957553 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:refreshAssociation Sep 13 00:04:10.957553 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:downloadContent Sep 13 00:04:10.957553 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:runPowerShellScript Sep 13 00:04:10.957553 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:configureDocker Sep 13 00:04:10.969747 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform independent plugin aws:configurePackage Sep 13 00:04:10.970124 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Successfully loaded platform dependent plugin aws:runShellScript Sep 13 00:04:10.970216 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Sep 13 00:04:10.970216 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO OS: linux, Arch: arm64 Sep 13 00:04:10.971012 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] Starting document processing engine... Sep 13 00:04:10.985095 amazon-ssm-agent[1780]: datastore file /var/lib/amazon/ssm/i-0ece36f167d8c90cb/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Sep 13 00:04:11.070419 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] [EngineProcessor] Starting Sep 13 00:04:11.165294 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Sep 13 00:04:11.260010 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] Starting message polling Sep 13 00:04:11.354761 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] Starting send replies to MDS Sep 13 00:04:11.449660 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [instanceID=i-0ece36f167d8c90cb] Starting association polling Sep 13 00:04:11.544843 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Sep 13 00:04:11.588980 tar[1799]: linux-arm64/README.md Sep 13 00:04:11.597700 systemd[1]: Finished prepare-helm.service. Sep 13 00:04:11.641494 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] [Association] Launching response handler Sep 13 00:04:11.737076 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Sep 13 00:04:11.833498 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Sep 13 00:04:11.863566 locksmithd[1854]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:04:11.928847 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Sep 13 00:04:12.025163 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [HealthCheck] HealthCheck reporting agent health. Sep 13 00:04:12.121483 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [OfflineService] Starting document processing engine... Sep 13 00:04:12.217920 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [OfflineService] [EngineProcessor] Starting Sep 13 00:04:12.314770 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [OfflineService] [EngineProcessor] Initial processing Sep 13 00:04:12.411775 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [OfflineService] Starting message polling Sep 13 00:04:12.508766 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [OfflineService] Starting send replies to MDS Sep 13 00:04:12.606021 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [LongRunningPluginsManager] starting long running plugin manager Sep 13 00:04:12.703706 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessageGatewayService] Starting session document processing engine... Sep 13 00:04:12.801350 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessageGatewayService] [EngineProcessor] Starting Sep 13 00:04:12.899284 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Sep 13 00:04:12.997392 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0ece36f167d8c90cb, requestId: afbd9c0a-47fc-4c40-9bd2-cf189d5f81f3 Sep 13 00:04:13.095751 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [MessageGatewayService] listening reply. Sep 13 00:04:13.138471 systemd[1]: Started kubelet.service. Sep 13 00:04:13.194395 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Sep 13 00:04:13.293294 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [StartupProcessor] Executing startup processor tasks Sep 13 00:04:13.392030 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Sep 13 00:04:13.491109 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Sep 13 00:04:13.590433 amazon-ssm-agent[1780]: 2025-09-13 00:04:10 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Sep 13 00:04:13.689874 amazon-ssm-agent[1780]: 2025-09-13 00:04:11 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Sep 13 00:04:13.789553 amazon-ssm-agent[1780]: 2025-09-13 00:04:11 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ece36f167d8c90cb?role=subscribe&stream=input Sep 13 00:04:13.889471 amazon-ssm-agent[1780]: 2025-09-13 00:04:11 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ece36f167d8c90cb?role=subscribe&stream=input Sep 13 00:04:13.989458 amazon-ssm-agent[1780]: 2025-09-13 00:04:11 INFO [MessageGatewayService] Starting receiving message from control channel Sep 13 00:04:14.089686 amazon-ssm-agent[1780]: 2025-09-13 00:04:11 INFO [MessageGatewayService] [EngineProcessor] Initial processing Sep 13 00:04:14.356345 sshd_keygen[1810]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:04:14.404801 systemd[1]: Finished sshd-keygen.service. Sep 13 00:04:14.411387 systemd[1]: Starting issuegen.service... Sep 13 00:04:14.429900 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:04:14.430316 systemd[1]: Finished issuegen.service. Sep 13 00:04:14.436230 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:04:14.455651 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:04:14.462248 systemd[1]: Started getty@tty1.service. Sep 13 00:04:14.470933 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:04:14.474085 systemd[1]: Reached target getty.target. Sep 13 00:04:14.478300 systemd[1]: Reached target multi-user.target. Sep 13 00:04:14.485969 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:04:14.515805 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:04:14.516211 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:04:14.524124 systemd[1]: Startup finished in 1.267s (kernel) + 8.870s (initrd) + 14.466s (userspace) = 24.604s. Sep 13 00:04:14.598268 kubelet[1987]: E0913 00:04:14.598168 1987 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:04:14.602224 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:04:14.602614 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:04:14.603122 systemd[1]: kubelet.service: Consumed 1.650s CPU time. Sep 13 00:04:17.772743 systemd[1]: Created slice system-sshd.slice. Sep 13 00:04:17.775166 systemd[1]: Started sshd@0-172.31.27.21:22-139.178.89.65:35432.service. Sep 13 00:04:18.014167 amazon-ssm-agent[1780]: 2025-09-13 00:04:18 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Sep 13 00:04:18.107048 sshd[2008]: Accepted publickey for core from 139.178.89.65 port 35432 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:04:18.112622 sshd[2008]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:04:18.136467 systemd[1]: Created slice user-500.slice. Sep 13 00:04:18.139160 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:04:18.146123 systemd-logind[1793]: New session 1 of user core. Sep 13 00:04:18.160773 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:04:18.164707 systemd[1]: Starting user@500.service... Sep 13 00:04:18.173266 (systemd)[2011]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:04:18.392361 systemd[2011]: Queued start job for default target default.target. Sep 13 00:04:18.393484 systemd[2011]: Reached target paths.target. Sep 13 00:04:18.393578 systemd[2011]: Reached target sockets.target. Sep 13 00:04:18.393612 systemd[2011]: Reached target timers.target. Sep 13 00:04:18.393642 systemd[2011]: Reached target basic.target. Sep 13 00:04:18.393753 systemd[2011]: Reached target default.target. Sep 13 00:04:18.393835 systemd[2011]: Startup finished in 208ms. Sep 13 00:04:18.393999 systemd[1]: Started user@500.service. Sep 13 00:04:18.396301 systemd[1]: Started session-1.scope. Sep 13 00:04:18.545050 systemd[1]: Started sshd@1-172.31.27.21:22-139.178.89.65:35442.service. Sep 13 00:04:18.722287 sshd[2020]: Accepted publickey for core from 139.178.89.65 port 35442 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:04:18.724927 sshd[2020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:04:18.733685 systemd-logind[1793]: New session 2 of user core. Sep 13 00:04:18.734614 systemd[1]: Started session-2.scope. Sep 13 00:04:18.865247 sshd[2020]: pam_unix(sshd:session): session closed for user core Sep 13 00:04:18.869835 systemd-logind[1793]: Session 2 logged out. Waiting for processes to exit. Sep 13 00:04:18.870459 systemd[1]: sshd@1-172.31.27.21:22-139.178.89.65:35442.service: Deactivated successfully. Sep 13 00:04:18.871735 systemd[1]: session-2.scope: Deactivated successfully. Sep 13 00:04:18.873365 systemd-logind[1793]: Removed session 2. Sep 13 00:04:18.896042 systemd[1]: Started sshd@2-172.31.27.21:22-139.178.89.65:35450.service. Sep 13 00:04:19.072082 sshd[2026]: Accepted publickey for core from 139.178.89.65 port 35450 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:04:19.075103 sshd[2026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:04:19.083601 systemd[1]: Started session-3.scope. Sep 13 00:04:19.084489 systemd-logind[1793]: New session 3 of user core. Sep 13 00:04:19.206683 sshd[2026]: pam_unix(sshd:session): session closed for user core Sep 13 00:04:19.211973 systemd[1]: sshd@2-172.31.27.21:22-139.178.89.65:35450.service: Deactivated successfully. Sep 13 00:04:19.213325 systemd[1]: session-3.scope: Deactivated successfully. Sep 13 00:04:19.214613 systemd-logind[1793]: Session 3 logged out. Waiting for processes to exit. Sep 13 00:04:19.216957 systemd-logind[1793]: Removed session 3. Sep 13 00:04:19.235004 systemd[1]: Started sshd@3-172.31.27.21:22-139.178.89.65:35460.service. Sep 13 00:04:19.414345 sshd[2032]: Accepted publickey for core from 139.178.89.65 port 35460 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:04:19.417490 sshd[2032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:04:19.425607 systemd-logind[1793]: New session 4 of user core. Sep 13 00:04:19.426635 systemd[1]: Started session-4.scope. Sep 13 00:04:19.559803 sshd[2032]: pam_unix(sshd:session): session closed for user core Sep 13 00:04:19.565814 systemd[1]: sshd@3-172.31.27.21:22-139.178.89.65:35460.service: Deactivated successfully. Sep 13 00:04:19.566126 systemd-logind[1793]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:04:19.567117 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:04:19.568931 systemd-logind[1793]: Removed session 4. Sep 13 00:04:19.587049 systemd[1]: Started sshd@4-172.31.27.21:22-139.178.89.65:35462.service. Sep 13 00:04:19.766161 sshd[2038]: Accepted publickey for core from 139.178.89.65 port 35462 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:04:19.769329 sshd[2038]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:04:19.777503 systemd-logind[1793]: New session 5 of user core. Sep 13 00:04:19.778472 systemd[1]: Started session-5.scope. Sep 13 00:04:19.935797 sudo[2041]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:04:19.936347 sudo[2041]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:04:19.958750 dbus-daemon[1783]: avc: received setenforce notice (enforcing=1) Sep 13 00:04:19.960634 sudo[2041]: pam_unix(sudo:session): session closed for user root Sep 13 00:04:19.985932 sshd[2038]: pam_unix(sshd:session): session closed for user core Sep 13 00:04:19.991870 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:04:19.993423 systemd[1]: sshd@4-172.31.27.21:22-139.178.89.65:35462.service: Deactivated successfully. Sep 13 00:04:19.993727 systemd-logind[1793]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:04:19.996167 systemd-logind[1793]: Removed session 5. Sep 13 00:04:20.013956 systemd[1]: Started sshd@5-172.31.27.21:22-139.178.89.65:45390.service. Sep 13 00:04:20.193729 sshd[2045]: Accepted publickey for core from 139.178.89.65 port 45390 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:04:20.196788 sshd[2045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:04:20.206341 systemd[1]: Started session-6.scope. Sep 13 00:04:20.208680 systemd-logind[1793]: New session 6 of user core. Sep 13 00:04:20.317138 sudo[2049]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:04:20.317725 sudo[2049]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:04:20.324857 sudo[2049]: pam_unix(sudo:session): session closed for user root Sep 13 00:04:20.335061 sudo[2048]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:04:20.336148 sudo[2048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:04:20.356336 systemd[1]: Stopping audit-rules.service... Sep 13 00:04:20.357000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:04:20.361427 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 13 00:04:20.361546 kernel: audit: type=1305 audit(1757721860.357:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:04:20.362131 auditctl[2052]: No rules Sep 13 00:04:20.363591 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:04:20.363939 systemd[1]: Stopped audit-rules.service. Sep 13 00:04:20.357000 audit[2052]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd6832ec0 a2=420 a3=0 items=0 ppid=1 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:20.378499 kernel: audit: type=1300 audit(1757721860.357:205): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd6832ec0 a2=420 a3=0 items=0 ppid=1 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:20.380120 systemd[1]: Starting audit-rules.service... Sep 13 00:04:20.357000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:04:20.385571 kernel: audit: type=1327 audit(1757721860.357:205): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:04:20.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.395707 kernel: audit: type=1131 audit(1757721860.360:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.420455 augenrules[2070]: No rules Sep 13 00:04:20.423123 systemd[1]: Finished audit-rules.service. Sep 13 00:04:20.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.425373 sudo[2048]: pam_unix(sudo:session): session closed for user root Sep 13 00:04:20.423000 audit[2048]: USER_END pid=2048 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.441844 kernel: audit: type=1130 audit(1757721860.422:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.441959 kernel: audit: type=1106 audit(1757721860.423:208): pid=2048 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.442017 kernel: audit: type=1104 audit(1757721860.423:209): pid=2048 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.423000 audit[2048]: CRED_DISP pid=2048 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.451036 sshd[2045]: pam_unix(sshd:session): session closed for user core Sep 13 00:04:20.452000 audit[2045]: USER_END pid=2045 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:04:20.453000 audit[2045]: CRED_DISP pid=2045 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:04:20.476915 kernel: audit: type=1106 audit(1757721860.452:210): pid=2045 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:04:20.477089 kernel: audit: type=1104 audit(1757721860.453:211): pid=2045 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:04:20.467621 systemd[1]: sshd@5-172.31.27.21:22-139.178.89.65:45390.service: Deactivated successfully. Sep 13 00:04:20.468942 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:04:20.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.21:22-139.178.89.65:45390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.488648 kernel: audit: type=1131 audit(1757721860.465:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.21:22-139.178.89.65:45390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.486476 systemd[1]: Started sshd@6-172.31.27.21:22-139.178.89.65:45396.service. Sep 13 00:04:20.488652 systemd-logind[1793]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:04:20.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.21:22-139.178.89.65:45396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.495351 systemd-logind[1793]: Removed session 6. Sep 13 00:04:20.664000 audit[2076]: USER_ACCT pid=2076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:04:20.666649 sshd[2076]: Accepted publickey for core from 139.178.89.65 port 45396 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:04:20.667000 audit[2076]: CRED_ACQ pid=2076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:04:20.667000 audit[2076]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd12bb510 a2=3 a3=1 items=0 ppid=1 pid=2076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:20.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:04:20.670127 sshd[2076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:04:20.678403 systemd-logind[1793]: New session 7 of user core. Sep 13 00:04:20.679401 systemd[1]: Started session-7.scope. Sep 13 00:04:20.687000 audit[2076]: USER_START pid=2076 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:04:20.690000 audit[2078]: CRED_ACQ pid=2078 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:04:20.783000 audit[2079]: USER_ACCT pid=2079 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.785722 sudo[2079]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:04:20.784000 audit[2079]: CRED_REFR pid=2079 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.786303 sudo[2079]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:04:20.788000 audit[2079]: USER_START pid=2079 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:04:20.870565 systemd[1]: Starting docker.service... Sep 13 00:04:20.991634 env[2089]: time="2025-09-13T00:04:20.991541651Z" level=info msg="Starting up" Sep 13 00:04:20.995739 env[2089]: time="2025-09-13T00:04:20.995678375Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:04:20.995931 env[2089]: time="2025-09-13T00:04:20.995897879Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:04:20.996074 env[2089]: time="2025-09-13T00:04:20.996039431Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:04:20.996193 env[2089]: time="2025-09-13T00:04:20.996163895Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:04:21.001222 env[2089]: time="2025-09-13T00:04:21.001143103Z" level=info msg="parsed scheme: \"unix\"" module=grpc Sep 13 00:04:21.001222 env[2089]: time="2025-09-13T00:04:21.001192123Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Sep 13 00:04:21.001469 env[2089]: time="2025-09-13T00:04:21.001232935Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Sep 13 00:04:21.001469 env[2089]: time="2025-09-13T00:04:21.001262275Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Sep 13 00:04:21.034856 env[2089]: time="2025-09-13T00:04:21.034790995Z" level=info msg="Loading containers: start." Sep 13 00:04:21.195000 audit[2120]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.195000 audit[2120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff1e4f300 a2=0 a3=1 items=0 ppid=2089 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.195000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Sep 13 00:04:21.200000 audit[2122]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.200000 audit[2122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffed562450 a2=0 a3=1 items=0 ppid=2089 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.200000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Sep 13 00:04:21.204000 audit[2124]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.204000 audit[2124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe2fa9460 a2=0 a3=1 items=0 ppid=2089 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.204000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:04:21.208000 audit[2126]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.208000 audit[2126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdff5d850 a2=0 a3=1 items=0 ppid=2089 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.208000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:04:21.220000 audit[2128]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.220000 audit[2128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd06f8330 a2=0 a3=1 items=0 ppid=2089 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.220000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Sep 13 00:04:21.250000 audit[2133]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.250000 audit[2133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeb3e2aa0 a2=0 a3=1 items=0 ppid=2089 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.250000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Sep 13 00:04:21.263000 audit[2135]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.263000 audit[2135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd082f810 a2=0 a3=1 items=0 ppid=2089 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.263000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Sep 13 00:04:21.267000 audit[2137]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.267000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffc18c2ae0 a2=0 a3=1 items=0 ppid=2089 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.267000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Sep 13 00:04:21.272000 audit[2139]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.272000 audit[2139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc0d3eba0 a2=0 a3=1 items=0 ppid=2089 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:04:21.288000 audit[2143]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.288000 audit[2143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd4cae7c0 a2=0 a3=1 items=0 ppid=2089 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.288000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:04:21.296000 audit[2144]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.296000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffed59dae0 a2=0 a3=1 items=0 ppid=2089 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:04:21.328706 kernel: Initializing XFRM netlink socket Sep 13 00:04:21.401053 env[2089]: time="2025-09-13T00:04:21.400990485Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Sep 13 00:04:21.405106 (udev-worker)[2100]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:04:21.450000 audit[2152]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.450000 audit[2152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd70e2b40 a2=0 a3=1 items=0 ppid=2089 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Sep 13 00:04:21.468000 audit[2155]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.468000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc4a2b780 a2=0 a3=1 items=0 ppid=2089 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.468000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Sep 13 00:04:21.477000 audit[2158]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.477000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffce547e40 a2=0 a3=1 items=0 ppid=2089 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.477000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Sep 13 00:04:21.481000 audit[2160]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.481000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe75fea60 a2=0 a3=1 items=0 ppid=2089 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.481000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Sep 13 00:04:21.488000 audit[2162]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.488000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffdbe15480 a2=0 a3=1 items=0 ppid=2089 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.488000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Sep 13 00:04:21.492000 audit[2164]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.492000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc945b680 a2=0 a3=1 items=0 ppid=2089 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.492000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Sep 13 00:04:21.498000 audit[2166]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.498000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff317b250 a2=0 a3=1 items=0 ppid=2089 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.498000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Sep 13 00:04:21.522000 audit[2169]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.522000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff7af9780 a2=0 a3=1 items=0 ppid=2089 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.522000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Sep 13 00:04:21.528000 audit[2171]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.528000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd2dfa690 a2=0 a3=1 items=0 ppid=2089 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.528000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Sep 13 00:04:21.534000 audit[2173]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.534000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc1128bb0 a2=0 a3=1 items=0 ppid=2089 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Sep 13 00:04:21.539000 audit[2175]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.539000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd9f8bd70 a2=0 a3=1 items=0 ppid=2089 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.539000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Sep 13 00:04:21.541554 systemd-networkd[1518]: docker0: Link UP Sep 13 00:04:21.558000 audit[2179]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.558000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe2ad2660 a2=0 a3=1 items=0 ppid=2089 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.558000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:04:21.565000 audit[2180]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:21.565000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd9d8a770 a2=0 a3=1 items=0 ppid=2089 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:21.565000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Sep 13 00:04:21.568168 env[2089]: time="2025-09-13T00:04:21.568101406Z" level=info msg="Loading containers: done." Sep 13 00:04:21.601752 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4292541365-merged.mount: Deactivated successfully. Sep 13 00:04:21.613727 env[2089]: time="2025-09-13T00:04:21.613652518Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 13 00:04:21.614435 env[2089]: time="2025-09-13T00:04:21.614384386Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Sep 13 00:04:21.614858 env[2089]: time="2025-09-13T00:04:21.614820046Z" level=info msg="Daemon has completed initialization" Sep 13 00:04:21.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:21.643370 systemd[1]: Started docker.service. Sep 13 00:04:21.660828 env[2089]: time="2025-09-13T00:04:21.660599890Z" level=info msg="API listen on /run/docker.sock" Sep 13 00:04:22.974498 env[1800]: time="2025-09-13T00:04:22.974433625Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\"" Sep 13 00:04:23.526013 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2840102805.mount: Deactivated successfully. Sep 13 00:04:24.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:24.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:24.854032 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 00:04:24.854424 systemd[1]: Stopped kubelet.service. Sep 13 00:04:24.854541 systemd[1]: kubelet.service: Consumed 1.650s CPU time. Sep 13 00:04:24.857269 systemd[1]: Starting kubelet.service... Sep 13 00:04:25.221768 systemd[1]: Started kubelet.service. Sep 13 00:04:25.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:25.307563 kubelet[2216]: E0913 00:04:25.307454 2216 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:04:25.314225 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:04:25.314632 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:04:25.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:04:25.633953 env[1800]: time="2025-09-13T00:04:25.633171122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:25.638392 env[1800]: time="2025-09-13T00:04:25.638303738Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6a7fd297b49102b08dc3d8d4fd7f1538bcf21d3131eae8bf62ba26ce3283237f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:25.643834 env[1800]: time="2025-09-13T00:04:25.643749914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:25.648579 env[1800]: time="2025-09-13T00:04:25.648472370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:1b9c6c00bc1fe86860e72efb8e4148f9e436a132eba4ca636ca4f48d61d6dfb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:25.650846 env[1800]: time="2025-09-13T00:04:25.650766194Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\" returns image reference \"sha256:6a7fd297b49102b08dc3d8d4fd7f1538bcf21d3131eae8bf62ba26ce3283237f\"" Sep 13 00:04:25.653851 env[1800]: time="2025-09-13T00:04:25.653801474Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\"" Sep 13 00:04:27.993488 env[1800]: time="2025-09-13T00:04:27.993428574Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:28.004797 env[1800]: time="2025-09-13T00:04:28.004733474Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2dd4c25a937008b7b8a6cdca70d816403b5078b51550926721b7a7762139cd23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:28.008414 env[1800]: time="2025-09-13T00:04:28.008345366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:28.012031 env[1800]: time="2025-09-13T00:04:28.011976386Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:1082a6ab67fb46397314dd36b36cb197ba4a4c5365033e9ad22bc7edaaaabd5c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:28.014078 env[1800]: time="2025-09-13T00:04:28.014027666Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\" returns image reference \"sha256:2dd4c25a937008b7b8a6cdca70d816403b5078b51550926721b7a7762139cd23\"" Sep 13 00:04:28.015041 env[1800]: time="2025-09-13T00:04:28.014990150Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\"" Sep 13 00:04:29.642844 env[1800]: time="2025-09-13T00:04:29.642757722Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:29.645693 env[1800]: time="2025-09-13T00:04:29.645611826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e600beaed8620718e0650dd2721266869ce1d737488c004a869333273e6ec15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:29.649763 env[1800]: time="2025-09-13T00:04:29.649697730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:29.653720 env[1800]: time="2025-09-13T00:04:29.653657862Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:3e7b57c9d9f06b77f0064e5be7f3df61e0151101160acd5fdecce911df28a189,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:29.655780 env[1800]: time="2025-09-13T00:04:29.655677906Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\" returns image reference \"sha256:5e600beaed8620718e0650dd2721266869ce1d737488c004a869333273e6ec15\"" Sep 13 00:04:29.657097 env[1800]: time="2025-09-13T00:04:29.657033210Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Sep 13 00:04:31.060631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4024441455.mount: Deactivated successfully. Sep 13 00:04:32.036011 env[1800]: time="2025-09-13T00:04:32.035916330Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:32.039520 env[1800]: time="2025-09-13T00:04:32.039437766Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:021a8d45ab0c346664e47d95595ff5180ce90a22a681ea27904c65ae90788e70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:32.042088 env[1800]: time="2025-09-13T00:04:32.042036090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:32.044949 env[1800]: time="2025-09-13T00:04:32.044898270Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:021a8d45ab0c346664e47d95595ff5180ce90a22a681ea27904c65ae90788e70\"" Sep 13 00:04:32.045817 env[1800]: time="2025-09-13T00:04:32.045774438Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" Sep 13 00:04:32.046220 env[1800]: time="2025-09-13T00:04:32.043886454Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:32.517271 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3189118931.mount: Deactivated successfully. Sep 13 00:04:33.966672 env[1800]: time="2025-09-13T00:04:33.966593460Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:33.969465 env[1800]: time="2025-09-13T00:04:33.969391032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f72407be9e08c3a1b29a88318cbfee87b9f2da489f84015a5090b1e386e4dbc1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:33.973302 env[1800]: time="2025-09-13T00:04:33.973231428Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:33.977296 env[1800]: time="2025-09-13T00:04:33.977218104Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:33.979452 env[1800]: time="2025-09-13T00:04:33.979365936Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:f72407be9e08c3a1b29a88318cbfee87b9f2da489f84015a5090b1e386e4dbc1\"" Sep 13 00:04:33.980355 env[1800]: time="2025-09-13T00:04:33.980302464Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Sep 13 00:04:34.454485 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4140322966.mount: Deactivated successfully. Sep 13 00:04:34.464667 env[1800]: time="2025-09-13T00:04:34.464582854Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:34.467870 env[1800]: time="2025-09-13T00:04:34.467795482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:34.470471 env[1800]: time="2025-09-13T00:04:34.470408086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:34.473248 env[1800]: time="2025-09-13T00:04:34.473195158Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:34.474294 env[1800]: time="2025-09-13T00:04:34.474232546Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" Sep 13 00:04:34.475205 env[1800]: time="2025-09-13T00:04:34.475160470Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" Sep 13 00:04:34.956103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2696935467.mount: Deactivated successfully. Sep 13 00:04:35.469913 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 00:04:35.480545 kernel: kauditd_printk_skb: 88 callbacks suppressed Sep 13 00:04:35.480670 kernel: audit: type=1130 audit(1757721875.468:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:35.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:35.470312 systemd[1]: Stopped kubelet.service. Sep 13 00:04:35.473185 systemd[1]: Starting kubelet.service... Sep 13 00:04:35.493120 kernel: audit: type=1131 audit(1757721875.468:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:35.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:35.891973 systemd[1]: Started kubelet.service. Sep 13 00:04:35.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:35.903556 kernel: audit: type=1130 audit(1757721875.891:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:35.998243 kubelet[2227]: E0913 00:04:35.998119 2227 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:04:36.001971 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:04:36.002345 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:04:36.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:04:36.013721 kernel: audit: type=1131 audit(1757721876.001:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:04:38.199389 env[1800]: time="2025-09-13T00:04:38.199305253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:38.202638 env[1800]: time="2025-09-13T00:04:38.202565677Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:31747a36ce712f0bf61b50a0c06e99768522025e7b8daedd6dc63d1ae84837b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:38.207024 env[1800]: time="2025-09-13T00:04:38.206959933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:38.210906 env[1800]: time="2025-09-13T00:04:38.210835345Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:38.213021 env[1800]: time="2025-09-13T00:04:38.212947657Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:31747a36ce712f0bf61b50a0c06e99768522025e7b8daedd6dc63d1ae84837b5\"" Sep 13 00:04:40.606594 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 13 00:04:40.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:40.615550 kernel: audit: type=1131 audit(1757721880.605:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:40.628000 audit: BPF prog-id=46 op=UNLOAD Sep 13 00:04:40.628000 audit: BPF prog-id=45 op=UNLOAD Sep 13 00:04:40.634645 kernel: audit: type=1334 audit(1757721880.628:256): prog-id=46 op=UNLOAD Sep 13 00:04:40.634721 kernel: audit: type=1334 audit(1757721880.628:257): prog-id=45 op=UNLOAD Sep 13 00:04:40.634771 kernel: audit: type=1334 audit(1757721880.628:258): prog-id=44 op=UNLOAD Sep 13 00:04:40.628000 audit: BPF prog-id=44 op=UNLOAD Sep 13 00:04:46.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:46.219917 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 13 00:04:46.220314 systemd[1]: Stopped kubelet.service. Sep 13 00:04:46.227364 systemd[1]: Starting kubelet.service... Sep 13 00:04:46.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:46.241149 kernel: audit: type=1130 audit(1757721886.219:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:46.241371 kernel: audit: type=1131 audit(1757721886.219:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:46.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:46.575679 systemd[1]: Started kubelet.service. Sep 13 00:04:46.586663 kernel: audit: type=1130 audit(1757721886.575:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:46.677230 kubelet[2259]: E0913 00:04:46.677121 2259 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:04:46.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:04:46.681467 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:04:46.681825 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:04:46.692614 kernel: audit: type=1131 audit(1757721886.681:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 00:04:48.061118 amazon-ssm-agent[1780]: 2025-09-13 00:04:48 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Sep 13 00:04:48.298836 systemd[1]: Stopped kubelet.service. Sep 13 00:04:48.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:48.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:48.318665 kernel: audit: type=1130 audit(1757721888.299:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:48.318843 kernel: audit: type=1131 audit(1757721888.302:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:48.309944 systemd[1]: Starting kubelet.service... Sep 13 00:04:48.367258 systemd[1]: Reloading. Sep 13 00:04:48.565529 /usr/lib/systemd/system-generators/torcx-generator[2291]: time="2025-09-13T00:04:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:04:48.565595 /usr/lib/systemd/system-generators/torcx-generator[2291]: time="2025-09-13T00:04:48Z" level=info msg="torcx already run" Sep 13 00:04:48.765739 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:04:48.766049 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:04:48.808227 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:04:48.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.001025 kernel: audit: type=1400 audit(1757721888.982:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.001180 kernel: audit: type=1400 audit(1757721888.982:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012442 kernel: audit: type=1400 audit(1757721888.983:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012623 kernel: audit: type=1400 audit(1757721888.983:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.990000 audit: BPF prog-id=49 op=LOAD Sep 13 00:04:48.990000 audit: BPF prog-id=47 op=UNLOAD Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit: BPF prog-id=50 op=LOAD Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.992000 audit: BPF prog-id=51 op=LOAD Sep 13 00:04:48.992000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:04:48.992000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:48.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.000000 audit: BPF prog-id=52 op=LOAD Sep 13 00:04:49.000000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit: BPF prog-id=53 op=LOAD Sep 13 00:04:49.012000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit: BPF prog-id=54 op=LOAD Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.024000 audit: BPF prog-id=55 op=LOAD Sep 13 00:04:49.024000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:04:49.024000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.026000 audit: BPF prog-id=56 op=LOAD Sep 13 00:04:49.026000 audit: BPF prog-id=40 op=UNLOAD Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit: BPF prog-id=57 op=LOAD Sep 13 00:04:49.030000 audit: BPF prog-id=41 op=UNLOAD Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit: BPF prog-id=58 op=LOAD Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.031000 audit: BPF prog-id=59 op=LOAD Sep 13 00:04:49.031000 audit: BPF prog-id=42 op=UNLOAD Sep 13 00:04:49.031000 audit: BPF prog-id=43 op=UNLOAD Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit: BPF prog-id=60 op=LOAD Sep 13 00:04:49.033000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit: BPF prog-id=61 op=LOAD Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.033000 audit: BPF prog-id=62 op=LOAD Sep 13 00:04:49.033000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:04:49.033000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:49.036000 audit: BPF prog-id=63 op=LOAD Sep 13 00:04:49.036000 audit: BPF prog-id=39 op=UNLOAD Sep 13 00:04:49.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:49.066623 systemd[1]: Started kubelet.service. Sep 13 00:04:49.078277 systemd[1]: Stopping kubelet.service... Sep 13 00:04:49.080018 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:04:49.080463 systemd[1]: Stopped kubelet.service. Sep 13 00:04:49.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:49.084070 systemd[1]: Starting kubelet.service... Sep 13 00:04:49.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:04:49.459623 systemd[1]: Started kubelet.service. Sep 13 00:04:49.543046 kubelet[2359]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:04:49.543646 kubelet[2359]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:04:49.543646 kubelet[2359]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:04:49.543813 kubelet[2359]: I0913 00:04:49.543763 2359 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:04:51.422115 kubelet[2359]: I0913 00:04:51.422057 2359 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 13 00:04:51.422793 kubelet[2359]: I0913 00:04:51.422762 2359 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:04:51.423337 kubelet[2359]: I0913 00:04:51.423299 2359 server.go:956] "Client rotation is on, will bootstrap in background" Sep 13 00:04:51.481391 kubelet[2359]: E0913 00:04:51.481336 2359 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://172.31.27.21:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Sep 13 00:04:51.484614 kubelet[2359]: I0913 00:04:51.484528 2359 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:04:51.505427 kubelet[2359]: E0913 00:04:51.505319 2359 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:04:51.505427 kubelet[2359]: I0913 00:04:51.505415 2359 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:04:51.511360 kubelet[2359]: I0913 00:04:51.511310 2359 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:04:51.514224 kubelet[2359]: I0913 00:04:51.514126 2359 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:04:51.514541 kubelet[2359]: I0913 00:04:51.514210 2359 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-27-21","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:04:51.514727 kubelet[2359]: I0913 00:04:51.514698 2359 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:04:51.514727 kubelet[2359]: I0913 00:04:51.514727 2359 container_manager_linux.go:303] "Creating device plugin manager" Sep 13 00:04:51.515200 kubelet[2359]: I0913 00:04:51.515134 2359 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:04:51.522381 kubelet[2359]: I0913 00:04:51.522306 2359 kubelet.go:480] "Attempting to sync node with API server" Sep 13 00:04:51.522381 kubelet[2359]: I0913 00:04:51.522362 2359 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:04:51.522651 kubelet[2359]: I0913 00:04:51.522406 2359 kubelet.go:386] "Adding apiserver pod source" Sep 13 00:04:51.532196 kubelet[2359]: I0913 00:04:51.532085 2359 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:04:51.534526 kubelet[2359]: I0913 00:04:51.534470 2359 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:04:51.536026 kubelet[2359]: I0913 00:04:51.535975 2359 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 13 00:04:51.536454 kubelet[2359]: W0913 00:04:51.536423 2359 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:04:51.541616 kubelet[2359]: I0913 00:04:51.541579 2359 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:04:51.541869 kubelet[2359]: I0913 00:04:51.541841 2359 server.go:1289] "Started kubelet" Sep 13 00:04:51.542338 kubelet[2359]: E0913 00:04:51.542292 2359 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://172.31.27.21:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-21&limit=500&resourceVersion=0\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 13 00:04:51.555903 kubelet[2359]: E0913 00:04:51.555774 2359 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://172.31.27.21:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 13 00:04:51.556094 kubelet[2359]: I0913 00:04:51.555947 2359 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:04:51.556902 kubelet[2359]: I0913 00:04:51.556856 2359 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:04:51.571000 audit[2359]: AVC avc: denied { mac_admin } for pid=2359 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:51.573835 kernel: kauditd_printk_skb: 171 callbacks suppressed Sep 13 00:04:51.573944 kernel: audit: type=1400 audit(1757721891.571:440): avc: denied { mac_admin } for pid=2359 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:51.581391 kubelet[2359]: I0913 00:04:51.581303 2359 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:04:51.581598 kubelet[2359]: I0913 00:04:51.581419 2359 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:04:51.583396 kubelet[2359]: E0913 00:04:51.580835 2359 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.27.21:6443/api/v1/namespaces/default/events\": dial tcp 172.31.27.21:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-27-21.1864aebf5f46ae69 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-27-21,UID:ip-172-31-27-21,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-27-21,},FirstTimestamp:2025-09-13 00:04:51.541790313 +0000 UTC m=+2.072454123,LastTimestamp:2025-09-13 00:04:51.541790313 +0000 UTC m=+2.072454123,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-27-21,}" Sep 13 00:04:51.571000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:04:51.585014 kubelet[2359]: I0913 00:04:51.584974 2359 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:04:51.587793 kernel: audit: type=1401 audit(1757721891.571:440): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:04:51.589491 kubelet[2359]: I0913 00:04:51.589384 2359 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:04:51.571000 audit[2359]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009e9b00 a1=4000ac2cf0 a2=40009e9ad0 a3=25 items=0 ppid=1 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.600831 kernel: audit: type=1300 audit(1757721891.571:440): arch=c00000b7 syscall=5 success=no exit=-22 a0=40009e9b00 a1=4000ac2cf0 a2=40009e9ad0 a3=25 items=0 ppid=1 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.571000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:04:51.602949 kubelet[2359]: I0913 00:04:51.602905 2359 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:04:51.607955 kubelet[2359]: I0913 00:04:51.607911 2359 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:04:51.608577 kubelet[2359]: E0913 00:04:51.608543 2359 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-27-21\" not found" Sep 13 00:04:51.611889 kernel: audit: type=1327 audit(1757721891.571:440): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:04:51.612028 kernel: audit: type=1400 audit(1757721891.580:441): avc: denied { mac_admin } for pid=2359 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:51.580000 audit[2359]: AVC avc: denied { mac_admin } for pid=2359 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:51.613137 kubelet[2359]: I0913 00:04:51.613086 2359 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:04:51.613445 kubelet[2359]: I0913 00:04:51.613418 2359 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:04:51.615621 kubelet[2359]: I0913 00:04:51.615587 2359 factory.go:223] Registration of the systemd container factory successfully Sep 13 00:04:51.615979 kubelet[2359]: I0913 00:04:51.615946 2359 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:04:51.616795 kubelet[2359]: E0913 00:04:51.616741 2359 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.21:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-21?timeout=10s\": dial tcp 172.31.27.21:6443: connect: connection refused" interval="200ms" Sep 13 00:04:51.619423 kubelet[2359]: I0913 00:04:51.619381 2359 factory.go:223] Registration of the containerd container factory successfully Sep 13 00:04:51.580000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:04:51.627546 kernel: audit: type=1401 audit(1757721891.580:441): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:04:51.627652 kernel: audit: type=1300 audit(1757721891.580:441): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b04020 a1=4000ac2d08 a2=40009e9b90 a3=25 items=0 ppid=1 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.580000 audit[2359]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b04020 a1=4000ac2d08 a2=40009e9b90 a3=25 items=0 ppid=1 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.635187 kubelet[2359]: I0913 00:04:51.623493 2359 server.go:317] "Adding debug handlers to kubelet server" Sep 13 00:04:51.637007 kubelet[2359]: E0913 00:04:51.620676 2359 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://172.31.27.21:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 13 00:04:51.580000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:04:51.648805 kernel: audit: type=1327 audit(1757721891.580:441): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:04:51.648938 kernel: audit: type=1325 audit(1757721891.595:442): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.595000 audit[2374]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.595000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe8aac380 a2=0 a3=1 items=0 ppid=2359 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.655464 kubelet[2359]: E0913 00:04:51.655419 2359 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:04:51.665560 kernel: audit: type=1300 audit(1757721891.595:442): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe8aac380 a2=0 a3=1 items=0 ppid=2359 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:04:51.595000 audit[2375]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.595000 audit[2375]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffceda0200 a2=0 a3=1 items=0 ppid=2359 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:04:51.619000 audit[2377]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.619000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffeea24f20 a2=0 a3=1 items=0 ppid=2359 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:04:51.638000 audit[2380]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.638000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffa5c2030 a2=0 a3=1 items=0 ppid=2359 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:04:51.678237 kubelet[2359]: I0913 00:04:51.678131 2359 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:04:51.678412 kubelet[2359]: I0913 00:04:51.678387 2359 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:04:51.678686 kubelet[2359]: I0913 00:04:51.678663 2359 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:04:51.682943 kubelet[2359]: I0913 00:04:51.682893 2359 policy_none.go:49] "None policy: Start" Sep 13 00:04:51.683194 kubelet[2359]: I0913 00:04:51.683168 2359 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:04:51.683341 kubelet[2359]: I0913 00:04:51.683321 2359 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:04:51.685000 audit[2386]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.685000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdf0978e0 a2=0 a3=1 items=0 ppid=2359 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:04:51.686217 kubelet[2359]: I0913 00:04:51.686143 2359 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 13 00:04:51.687000 audit[2387]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:04:51.687000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd1333230 a2=0 a3=1 items=0 ppid=2359 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:04:51.689578 kubelet[2359]: I0913 00:04:51.689192 2359 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 13 00:04:51.689578 kubelet[2359]: I0913 00:04:51.689236 2359 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 13 00:04:51.689578 kubelet[2359]: I0913 00:04:51.689270 2359 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:04:51.689578 kubelet[2359]: I0913 00:04:51.689287 2359 kubelet.go:2436] "Starting kubelet main sync loop" Sep 13 00:04:51.689578 kubelet[2359]: E0913 00:04:51.689359 2359 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:04:51.691000 audit[2388]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.691000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb781a70 a2=0 a3=1 items=0 ppid=2359 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:04:51.693785 kubelet[2359]: E0913 00:04:51.693730 2359 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://172.31.27.21:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Sep 13 00:04:51.695000 audit[2390]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.695000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf736290 a2=0 a3=1 items=0 ppid=2359 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:04:51.696000 audit[2389]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:04:51.696000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc49191d0 a2=0 a3=1 items=0 ppid=2359 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:04:51.699965 systemd[1]: Created slice kubepods.slice. Sep 13 00:04:51.700000 audit[2392]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:04:51.700000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff8f951c0 a2=0 a3=1 items=0 ppid=2359 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:04:51.704000 audit[2393]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:04:51.704000 audit[2393]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe4bed470 a2=0 a3=1 items=0 ppid=2359 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:04:51.709304 kubelet[2359]: E0913 00:04:51.709253 2359 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-27-21\" not found" Sep 13 00:04:51.710000 audit[2394]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:04:51.710000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd98d4a70 a2=0 a3=1 items=0 ppid=2359 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:04:51.713656 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:04:51.720410 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:04:51.730566 kubelet[2359]: E0913 00:04:51.730102 2359 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 13 00:04:51.734000 audit[2359]: AVC avc: denied { mac_admin } for pid=2359 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:51.734000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:04:51.734000 audit[2359]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ce4a50 a1=4000d9a4b0 a2=4000ce4a20 a3=25 items=0 ppid=1 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:51.734000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:04:51.736917 kubelet[2359]: E0913 00:04:51.736880 2359 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 13 00:04:51.737299 kubelet[2359]: I0913 00:04:51.737273 2359 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:04:51.737571 kubelet[2359]: I0913 00:04:51.737487 2359 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:04:51.740174 kubelet[2359]: I0913 00:04:51.740121 2359 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:04:51.740911 kubelet[2359]: E0913 00:04:51.740876 2359 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:04:51.741103 kubelet[2359]: E0913 00:04:51.741079 2359 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-27-21\" not found" Sep 13 00:04:51.811310 systemd[1]: Created slice kubepods-burstable-podaa3129e6d91c130603d4f0abcbc1abd6.slice. Sep 13 00:04:51.814969 kubelet[2359]: I0913 00:04:51.814915 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:04:51.815290 kubelet[2359]: I0913 00:04:51.815256 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:04:51.815480 kubelet[2359]: I0913 00:04:51.815450 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:04:51.815794 kubelet[2359]: I0913 00:04:51.815745 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6bbfe407bd618d95f976b7be499a30f1-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-21\" (UID: \"6bbfe407bd618d95f976b7be499a30f1\") " pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:04:51.816013 kubelet[2359]: I0913 00:04:51.815982 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:04:51.816227 kubelet[2359]: I0913 00:04:51.816195 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:04:51.816418 kubelet[2359]: I0913 00:04:51.816389 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/92fae504a24ca66e07705b25237163e4-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-21\" (UID: \"92fae504a24ca66e07705b25237163e4\") " pod="kube-system/kube-scheduler-ip-172-31-27-21" Sep 13 00:04:51.816625 kubelet[2359]: I0913 00:04:51.816595 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6bbfe407bd618d95f976b7be499a30f1-ca-certs\") pod \"kube-apiserver-ip-172-31-27-21\" (UID: \"6bbfe407bd618d95f976b7be499a30f1\") " pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:04:51.816816 kubelet[2359]: I0913 00:04:51.816770 2359 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6bbfe407bd618d95f976b7be499a30f1-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-21\" (UID: \"6bbfe407bd618d95f976b7be499a30f1\") " pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:04:51.817801 kubelet[2359]: E0913 00:04:51.817748 2359 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.21:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-21?timeout=10s\": dial tcp 172.31.27.21:6443: connect: connection refused" interval="400ms" Sep 13 00:04:51.824627 kubelet[2359]: E0913 00:04:51.824585 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:51.831794 systemd[1]: Created slice kubepods-burstable-pod92fae504a24ca66e07705b25237163e4.slice. Sep 13 00:04:51.836491 kubelet[2359]: E0913 00:04:51.836448 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:51.844994 systemd[1]: Created slice kubepods-burstable-pod6bbfe407bd618d95f976b7be499a30f1.slice. Sep 13 00:04:51.845599 kubelet[2359]: I0913 00:04:51.845566 2359 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-27-21" Sep 13 00:04:51.847090 kubelet[2359]: E0913 00:04:51.846988 2359 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.27.21:6443/api/v1/nodes\": dial tcp 172.31.27.21:6443: connect: connection refused" node="ip-172-31-27-21" Sep 13 00:04:51.849960 kubelet[2359]: E0913 00:04:51.849917 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:52.050149 kubelet[2359]: I0913 00:04:52.050099 2359 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-27-21" Sep 13 00:04:52.051326 kubelet[2359]: E0913 00:04:52.051260 2359 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.27.21:6443/api/v1/nodes\": dial tcp 172.31.27.21:6443: connect: connection refused" node="ip-172-31-27-21" Sep 13 00:04:52.127783 env[1800]: time="2025-09-13T00:04:52.127706129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-21,Uid:aa3129e6d91c130603d4f0abcbc1abd6,Namespace:kube-system,Attempt:0,}" Sep 13 00:04:52.138787 env[1800]: time="2025-09-13T00:04:52.138704939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-21,Uid:92fae504a24ca66e07705b25237163e4,Namespace:kube-system,Attempt:0,}" Sep 13 00:04:52.152361 env[1800]: time="2025-09-13T00:04:52.152288771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-21,Uid:6bbfe407bd618d95f976b7be499a30f1,Namespace:kube-system,Attempt:0,}" Sep 13 00:04:52.219109 kubelet[2359]: E0913 00:04:52.218995 2359 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.21:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-21?timeout=10s\": dial tcp 172.31.27.21:6443: connect: connection refused" interval="800ms" Sep 13 00:04:52.454483 kubelet[2359]: I0913 00:04:52.453643 2359 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-27-21" Sep 13 00:04:52.455086 kubelet[2359]: E0913 00:04:52.454618 2359 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.27.21:6443/api/v1/nodes\": dial tcp 172.31.27.21:6443: connect: connection refused" node="ip-172-31-27-21" Sep 13 00:04:52.475859 kubelet[2359]: E0913 00:04:52.475778 2359 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://172.31.27.21:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 13 00:04:52.603920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount429654156.mount: Deactivated successfully. Sep 13 00:04:52.615353 env[1800]: time="2025-09-13T00:04:52.615261298Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.617833 env[1800]: time="2025-09-13T00:04:52.617748262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.621058 env[1800]: time="2025-09-13T00:04:52.620966768Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.624287 env[1800]: time="2025-09-13T00:04:52.624225369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.627365 env[1800]: time="2025-09-13T00:04:52.627304330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.632482 env[1800]: time="2025-09-13T00:04:52.632412702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.640971 env[1800]: time="2025-09-13T00:04:52.640860957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.647970 env[1800]: time="2025-09-13T00:04:52.647869828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.655942 env[1800]: time="2025-09-13T00:04:52.655860446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.673412 kubelet[2359]: E0913 00:04:52.673324 2359 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://172.31.27.21:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-21&limit=500&resourceVersion=0\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 13 00:04:52.681606 kubelet[2359]: E0913 00:04:52.681528 2359 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://172.31.27.21:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Sep 13 00:04:52.682319 env[1800]: time="2025-09-13T00:04:52.682248902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.690882 env[1800]: time="2025-09-13T00:04:52.690823944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.694590 env[1800]: time="2025-09-13T00:04:52.694335352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:04:52.724250 env[1800]: time="2025-09-13T00:04:52.723738121Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:04:52.724250 env[1800]: time="2025-09-13T00:04:52.723814626Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:04:52.724250 env[1800]: time="2025-09-13T00:04:52.723842324Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:04:52.724572 env[1800]: time="2025-09-13T00:04:52.724313401Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9d6ba5c0c129f1aaf2fdbd454739aafdc1af417370ad605dec78f6179924a6e pid=2410 runtime=io.containerd.runc.v2 Sep 13 00:04:52.727603 env[1800]: time="2025-09-13T00:04:52.727405347Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:04:52.727603 env[1800]: time="2025-09-13T00:04:52.727490516Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:04:52.727603 env[1800]: time="2025-09-13T00:04:52.727549824Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:04:52.729597 env[1800]: time="2025-09-13T00:04:52.729410361Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b029f99ec3afdd1ed1f1175e20bd837c785e398d5da7523f25265fa6c9cb1b7 pid=2411 runtime=io.containerd.runc.v2 Sep 13 00:04:52.745465 env[1800]: time="2025-09-13T00:04:52.745316135Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:04:52.745465 env[1800]: time="2025-09-13T00:04:52.745398964Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:04:52.745465 env[1800]: time="2025-09-13T00:04:52.745427358Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:04:52.746348 env[1800]: time="2025-09-13T00:04:52.746182313Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a79662961d3af76aef9be04b75fad570799d1f067b6ed5202701daa1851db764 pid=2439 runtime=io.containerd.runc.v2 Sep 13 00:04:52.756019 systemd[1]: Started cri-containerd-c9d6ba5c0c129f1aaf2fdbd454739aafdc1af417370ad605dec78f6179924a6e.scope. Sep 13 00:04:52.794432 systemd[1]: Started cri-containerd-0b029f99ec3afdd1ed1f1175e20bd837c785e398d5da7523f25265fa6c9cb1b7.scope. Sep 13 00:04:52.827578 systemd[1]: Started cri-containerd-a79662961d3af76aef9be04b75fad570799d1f067b6ed5202701daa1851db764.scope. Sep 13 00:04:52.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.848000 audit: BPF prog-id=64 op=LOAD Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2410 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643662613563306331323966316161663266646264343534373339 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2410 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643662613563306331323966316161663266646264343534373339 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit: BPF prog-id=65 op=LOAD Sep 13 00:04:52.849000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2410 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643662613563306331323966316161663266646264343534373339 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit: BPF prog-id=66 op=LOAD Sep 13 00:04:52.849000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2410 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643662613563306331323966316161663266646264343534373339 Sep 13 00:04:52.849000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:04:52.849000 audit: BPF prog-id=65 op=UNLOAD Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.849000 audit: BPF prog-id=67 op=LOAD Sep 13 00:04:52.849000 audit[2431]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2410 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643662613563306331323966316161663266646264343534373339 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.865000 audit: BPF prog-id=68 op=LOAD Sep 13 00:04:52.866000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.866000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2411 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303239663939656333616664643165643166313137356532306264 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2411 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303239663939656333616664643165643166313137356532306264 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.867000 audit: BPF prog-id=69 op=LOAD Sep 13 00:04:52.867000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2411 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303239663939656333616664643165643166313137356532306264 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.869000 audit: BPF prog-id=70 op=LOAD Sep 13 00:04:52.869000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2411 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303239663939656333616664643165643166313137356532306264 Sep 13 00:04:52.873000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:04:52.873000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { perfmon } for pid=2443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit[2443]: AVC avc: denied { bpf } for pid=2443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.873000 audit: BPF prog-id=71 op=LOAD Sep 13 00:04:52.873000 audit[2443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2411 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062303239663939656333616664643165643166313137356532306264 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.895000 audit: BPF prog-id=72 op=LOAD Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2439 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137393636323936316433616637366165663962653034623735666164 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2439 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137393636323936316433616637366165663962653034623735666164 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit: BPF prog-id=73 op=LOAD Sep 13 00:04:52.896000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2439 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137393636323936316433616637366165663962653034623735666164 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit: BPF prog-id=74 op=LOAD Sep 13 00:04:52.896000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2439 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137393636323936316433616637366165663962653034623735666164 Sep 13 00:04:52.896000 audit: BPF prog-id=74 op=UNLOAD Sep 13 00:04:52.896000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:52.896000 audit: BPF prog-id=75 op=LOAD Sep 13 00:04:52.896000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2439 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:52.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137393636323936316433616637366165663962653034623735666164 Sep 13 00:04:52.955565 env[1800]: time="2025-09-13T00:04:52.955478206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-21,Uid:6bbfe407bd618d95f976b7be499a30f1,Namespace:kube-system,Attempt:0,} returns sandbox id \"a79662961d3af76aef9be04b75fad570799d1f067b6ed5202701daa1851db764\"" Sep 13 00:04:52.965399 env[1800]: time="2025-09-13T00:04:52.965323408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-21,Uid:aa3129e6d91c130603d4f0abcbc1abd6,Namespace:kube-system,Attempt:0,} returns sandbox id \"0b029f99ec3afdd1ed1f1175e20bd837c785e398d5da7523f25265fa6c9cb1b7\"" Sep 13 00:04:52.967400 env[1800]: time="2025-09-13T00:04:52.967322314Z" level=info msg="CreateContainer within sandbox \"a79662961d3af76aef9be04b75fad570799d1f067b6ed5202701daa1851db764\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Sep 13 00:04:52.992914 env[1800]: time="2025-09-13T00:04:52.984364679Z" level=info msg="CreateContainer within sandbox \"0b029f99ec3afdd1ed1f1175e20bd837c785e398d5da7523f25265fa6c9cb1b7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Sep 13 00:04:53.002727 env[1800]: time="2025-09-13T00:04:53.002625752Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-21,Uid:92fae504a24ca66e07705b25237163e4,Namespace:kube-system,Attempt:0,} returns sandbox id \"c9d6ba5c0c129f1aaf2fdbd454739aafdc1af417370ad605dec78f6179924a6e\"" Sep 13 00:04:53.010002 env[1800]: time="2025-09-13T00:04:53.009935154Z" level=info msg="CreateContainer within sandbox \"c9d6ba5c0c129f1aaf2fdbd454739aafdc1af417370ad605dec78f6179924a6e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Sep 13 00:04:53.020655 kubelet[2359]: E0913 00:04:53.020567 2359 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.21:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-21?timeout=10s\": dial tcp 172.31.27.21:6443: connect: connection refused" interval="1.6s" Sep 13 00:04:53.023989 env[1800]: time="2025-09-13T00:04:53.023896392Z" level=info msg="CreateContainer within sandbox \"a79662961d3af76aef9be04b75fad570799d1f067b6ed5202701daa1851db764\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6c5060be44b21c4847d2335c8b172b2ce127369612a389d2d57416bc4baf4e07\"" Sep 13 00:04:53.025604 env[1800]: time="2025-09-13T00:04:53.025551661Z" level=info msg="StartContainer for \"6c5060be44b21c4847d2335c8b172b2ce127369612a389d2d57416bc4baf4e07\"" Sep 13 00:04:53.036263 env[1800]: time="2025-09-13T00:04:53.036174242Z" level=info msg="CreateContainer within sandbox \"0b029f99ec3afdd1ed1f1175e20bd837c785e398d5da7523f25265fa6c9cb1b7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b\"" Sep 13 00:04:53.038650 env[1800]: time="2025-09-13T00:04:53.038426546Z" level=info msg="StartContainer for \"bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b\"" Sep 13 00:04:53.039200 env[1800]: time="2025-09-13T00:04:53.039135476Z" level=info msg="CreateContainer within sandbox \"c9d6ba5c0c129f1aaf2fdbd454739aafdc1af417370ad605dec78f6179924a6e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706\"" Sep 13 00:04:53.040034 env[1800]: time="2025-09-13T00:04:53.039983686Z" level=info msg="StartContainer for \"78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706\"" Sep 13 00:04:53.087948 systemd[1]: Started cri-containerd-6c5060be44b21c4847d2335c8b172b2ce127369612a389d2d57416bc4baf4e07.scope. Sep 13 00:04:53.104136 kubelet[2359]: E0913 00:04:53.104055 2359 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://172.31.27.21:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.27.21:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 13 00:04:53.111491 systemd[1]: Started cri-containerd-78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706.scope. Sep 13 00:04:53.130933 systemd[1]: Started cri-containerd-bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b.scope. Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.166000 audit: BPF prog-id=76 op=LOAD Sep 13 00:04:53.167000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.167000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2439 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353036306265343462323163343834376432333335633862313732 Sep 13 00:04:53.167000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.167000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2439 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353036306265343462323163343834376432333335633862313732 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit: BPF prog-id=77 op=LOAD Sep 13 00:04:53.168000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2439 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353036306265343462323163343834376432333335633862313732 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit: BPF prog-id=78 op=LOAD Sep 13 00:04:53.168000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2439 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353036306265343462323163343834376432333335633862313732 Sep 13 00:04:53.168000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:04:53.168000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.168000 audit: BPF prog-id=79 op=LOAD Sep 13 00:04:53.168000 audit[2544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2439 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663353036306265343462323163343834376432333335633862313732 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.224000 audit: BPF prog-id=80 op=LOAD Sep 13 00:04:53.225000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.225000 audit[2560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2411 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336330643461313536613836623466616162393731346636323064 Sep 13 00:04:53.225000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.225000 audit[2560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2411 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336330643461313536613836623466616162393731346636323064 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.226000 audit: BPF prog-id=81 op=LOAD Sep 13 00:04:53.226000 audit[2560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2411 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336330643461313536613836623466616162393731346636323064 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.232000 audit: BPF prog-id=82 op=LOAD Sep 13 00:04:53.232000 audit[2560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2411 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336330643461313536613836623466616162393731346636323064 Sep 13 00:04:53.234000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:04:53.234000 audit: BPF prog-id=81 op=UNLOAD Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.234000 audit: BPF prog-id=83 op=LOAD Sep 13 00:04:53.234000 audit[2560]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2411 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336330643461313536613836623466616162393731346636323064 Sep 13 00:04:53.247892 env[1800]: time="2025-09-13T00:04:53.247745476Z" level=info msg="StartContainer for \"6c5060be44b21c4847d2335c8b172b2ce127369612a389d2d57416bc4baf4e07\" returns successfully" Sep 13 00:04:53.258397 kubelet[2359]: I0913 00:04:53.258214 2359 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-27-21" Sep 13 00:04:53.261402 kubelet[2359]: E0913 00:04:53.261258 2359 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.27.21:6443/api/v1/nodes\": dial tcp 172.31.27.21:6443: connect: connection refused" node="ip-172-31-27-21" Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.278000 audit: BPF prog-id=84 op=LOAD Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2410 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333937653766393061316363313432393338386461303937626631 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2410 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333937653766393061316363313432393338386461303937626631 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit: BPF prog-id=85 op=LOAD Sep 13 00:04:53.280000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2410 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333937653766393061316363313432393338386461303937626631 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.280000 audit: BPF prog-id=86 op=LOAD Sep 13 00:04:53.280000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2410 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333937653766393061316363313432393338386461303937626631 Sep 13 00:04:53.280000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:04:53.281000 audit: BPF prog-id=85 op=UNLOAD Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:04:53.281000 audit: BPF prog-id=87 op=LOAD Sep 13 00:04:53.281000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2410 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:04:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738333937653766393061316363313432393338386461303937626631 Sep 13 00:04:53.322441 env[1800]: time="2025-09-13T00:04:53.322371590Z" level=info msg="StartContainer for \"bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b\" returns successfully" Sep 13 00:04:53.417701 env[1800]: time="2025-09-13T00:04:53.417633986Z" level=info msg="StartContainer for \"78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706\" returns successfully" Sep 13 00:04:53.713562 kubelet[2359]: E0913 00:04:53.707249 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:53.718960 kubelet[2359]: E0913 00:04:53.718914 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:53.726989 kubelet[2359]: E0913 00:04:53.726942 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:54.726705 kubelet[2359]: E0913 00:04:54.726661 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:54.728131 kubelet[2359]: E0913 00:04:54.728084 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:54.730014 kubelet[2359]: E0913 00:04:54.729561 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:54.863986 kubelet[2359]: I0913 00:04:54.863942 2359 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-27-21" Sep 13 00:04:54.921372 update_engine[1795]: I0913 00:04:54.920568 1795 update_attempter.cc:509] Updating boot flags... Sep 13 00:04:55.728400 kubelet[2359]: E0913 00:04:55.728330 2359 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:57.540844 kernel: kauditd_printk_skb: 380 callbacks suppressed Sep 13 00:04:57.541030 kernel: audit: type=1400 audit(1757721897.527:563): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.527000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.530000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.555039 kernel: audit: type=1400 audit(1757721897.530:564): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.530000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4004d34b40 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.570055 kernel: audit: type=1300 audit(1757721897.530:564): arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4004d34b40 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.530000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:57.583072 kernel: audit: type=1327 audit(1757721897.530:564): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:57.527000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40063deba0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:57.608845 kernel: audit: type=1300 audit(1757721897.527:563): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40063deba0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.608999 kernel: audit: type=1327 audit(1757721897.527:563): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:57.544000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6791 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.619358 kernel: audit: type=1400 audit(1757721897.544:565): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6791 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.544000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400417e690 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.631937 kernel: audit: type=1300 audit(1757721897.544:565): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400417e690 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.544000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:57.642460 kernel: audit: type=1327 audit(1757721897.544:565): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:57.556000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6799 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.652479 kernel: audit: type=1400 audit(1757721897.556:566): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6799 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.556000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=40063dedb0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.556000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:57.607000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.607000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4004c88ec0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:57.607000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:57.607000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4004529080 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:04:57.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:04:58.293541 kubelet[2359]: E0913 00:04:58.293458 2359 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-27-21\" not found" node="ip-172-31-27-21" Sep 13 00:04:58.427408 kubelet[2359]: I0913 00:04:58.427360 2359 kubelet_node_status.go:78] "Successfully registered node" node="ip-172-31-27-21" Sep 13 00:04:58.427702 kubelet[2359]: E0913 00:04:58.427674 2359 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ip-172-31-27-21\": node \"ip-172-31-27-21\" not found" Sep 13 00:04:58.510766 kubelet[2359]: I0913 00:04:58.510698 2359 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-27-21" Sep 13 00:04:58.556586 kubelet[2359]: I0913 00:04:58.556406 2359 apiserver.go:52] "Watching apiserver" Sep 13 00:04:58.562946 kubelet[2359]: E0913 00:04:58.562884 2359 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-27-21\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ip-172-31-27-21" Sep 13 00:04:58.562946 kubelet[2359]: I0913 00:04:58.562936 2359 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:04:58.573546 kubelet[2359]: E0913 00:04:58.573481 2359 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ip-172-31-27-21\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:04:58.573756 kubelet[2359]: I0913 00:04:58.573727 2359 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:04:58.585896 kubelet[2359]: E0913 00:04:58.585847 2359 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ip-172-31-27-21\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:04:58.613994 kubelet[2359]: I0913 00:04:58.613920 2359 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:04:59.083000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:59.083000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=4000ba1650 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:04:59.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:04:59.083000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:04:59.083000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40003044e0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:04:59.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:00.983444 systemd[1]: Reloading. Sep 13 00:05:01.157639 /usr/lib/systemd/system-generators/torcx-generator[2853]: time="2025-09-13T00:05:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:05:01.158589 /usr/lib/systemd/system-generators/torcx-generator[2853]: time="2025-09-13T00:05:01Z" level=info msg="torcx already run" Sep 13 00:05:01.351773 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:05:01.351813 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:05:01.392625 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.594000 audit: BPF prog-id=88 op=LOAD Sep 13 00:05:01.594000 audit: BPF prog-id=49 op=UNLOAD Sep 13 00:05:01.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit: BPF prog-id=89 op=LOAD Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.596000 audit: BPF prog-id=90 op=LOAD Sep 13 00:05:01.596000 audit: BPF prog-id=50 op=UNLOAD Sep 13 00:05:01.596000 audit: BPF prog-id=51 op=UNLOAD Sep 13 00:05:01.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.601000 audit: BPF prog-id=91 op=LOAD Sep 13 00:05:01.601000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:05:01.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.604000 audit: BPF prog-id=92 op=LOAD Sep 13 00:05:01.604000 audit: BPF prog-id=52 op=UNLOAD Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.610000 audit: BPF prog-id=93 op=LOAD Sep 13 00:05:01.610000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.618000 audit: BPF prog-id=94 op=LOAD Sep 13 00:05:01.618000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit: BPF prog-id=95 op=LOAD Sep 13 00:05:01.620000 audit: BPF prog-id=53 op=UNLOAD Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit: BPF prog-id=96 op=LOAD Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.621000 audit: BPF prog-id=97 op=LOAD Sep 13 00:05:01.621000 audit: BPF prog-id=54 op=UNLOAD Sep 13 00:05:01.621000 audit: BPF prog-id=55 op=UNLOAD Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.624000 audit: BPF prog-id=98 op=LOAD Sep 13 00:05:01.624000 audit: BPF prog-id=56 op=UNLOAD Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit: BPF prog-id=99 op=LOAD Sep 13 00:05:01.627000 audit: BPF prog-id=57 op=UNLOAD Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit: BPF prog-id=100 op=LOAD Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.627000 audit: BPF prog-id=101 op=LOAD Sep 13 00:05:01.627000 audit: BPF prog-id=58 op=UNLOAD Sep 13 00:05:01.627000 audit: BPF prog-id=59 op=UNLOAD Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit: BPF prog-id=102 op=LOAD Sep 13 00:05:01.630000 audit: BPF prog-id=60 op=UNLOAD Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit: BPF prog-id=103 op=LOAD Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit: BPF prog-id=104 op=LOAD Sep 13 00:05:01.631000 audit: BPF prog-id=61 op=UNLOAD Sep 13 00:05:01.631000 audit: BPF prog-id=62 op=UNLOAD Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.632000 audit: BPF prog-id=105 op=LOAD Sep 13 00:05:01.632000 audit: BPF prog-id=68 op=UNLOAD Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.635000 audit: BPF prog-id=106 op=LOAD Sep 13 00:05:01.635000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.637000 audit: BPF prog-id=107 op=LOAD Sep 13 00:05:01.637000 audit: BPF prog-id=63 op=UNLOAD Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:01.638000 audit: BPF prog-id=108 op=LOAD Sep 13 00:05:01.639000 audit: BPF prog-id=80 op=UNLOAD Sep 13 00:05:01.670622 systemd[1]: Stopping kubelet.service... Sep 13 00:05:01.699242 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:05:01.699934 systemd[1]: Stopped kubelet.service. Sep 13 00:05:01.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:01.700172 systemd[1]: kubelet.service: Consumed 2.949s CPU time. Sep 13 00:05:01.705498 systemd[1]: Starting kubelet.service... Sep 13 00:05:02.057314 systemd[1]: Started kubelet.service. Sep 13 00:05:02.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:02.189684 kubelet[2910]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:05:02.190270 kubelet[2910]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:05:02.190422 kubelet[2910]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:05:02.190766 kubelet[2910]: I0913 00:05:02.190689 2910 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:05:02.208290 kubelet[2910]: I0913 00:05:02.205954 2910 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 13 00:05:02.208290 kubelet[2910]: I0913 00:05:02.206019 2910 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:05:02.208290 kubelet[2910]: I0913 00:05:02.206494 2910 server.go:956] "Client rotation is on, will bootstrap in background" Sep 13 00:05:02.211442 kubelet[2910]: I0913 00:05:02.211374 2910 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Sep 13 00:05:02.217901 kubelet[2910]: I0913 00:05:02.217841 2910 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:05:02.234627 kubelet[2910]: E0913 00:05:02.234479 2910 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:05:02.234861 kubelet[2910]: I0913 00:05:02.234830 2910 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:05:02.240109 kubelet[2910]: I0913 00:05:02.240062 2910 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:05:02.240909 kubelet[2910]: I0913 00:05:02.240843 2910 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:05:02.241380 kubelet[2910]: I0913 00:05:02.241102 2910 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-27-21","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:05:02.241705 kubelet[2910]: I0913 00:05:02.241676 2910 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:05:02.241831 kubelet[2910]: I0913 00:05:02.241808 2910 container_manager_linux.go:303] "Creating device plugin manager" Sep 13 00:05:02.242024 kubelet[2910]: I0913 00:05:02.241996 2910 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:05:02.242562 kubelet[2910]: I0913 00:05:02.242535 2910 kubelet.go:480] "Attempting to sync node with API server" Sep 13 00:05:02.242714 kubelet[2910]: I0913 00:05:02.242689 2910 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:05:02.242871 kubelet[2910]: I0913 00:05:02.242847 2910 kubelet.go:386] "Adding apiserver pod source" Sep 13 00:05:02.242997 kubelet[2910]: I0913 00:05:02.242976 2910 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:05:02.267252 kubelet[2910]: I0913 00:05:02.260734 2910 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:05:02.267252 kubelet[2910]: I0913 00:05:02.264928 2910 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 13 00:05:02.278363 kubelet[2910]: I0913 00:05:02.276659 2910 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:05:02.278363 kubelet[2910]: I0913 00:05:02.276744 2910 server.go:1289] "Started kubelet" Sep 13 00:05:02.285000 audit[2910]: AVC avc: denied { mac_admin } for pid=2910 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:02.285000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:05:02.285000 audit[2910]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400090e7b0 a1=400063ed20 a2=400090e780 a3=25 items=0 ppid=1 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:02.285000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:05:02.290937 kubelet[2910]: I0913 00:05:02.290879 2910 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:05:02.289000 audit[2910]: AVC avc: denied { mac_admin } for pid=2910 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:02.289000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:05:02.296929 kubelet[2910]: I0913 00:05:02.295610 2910 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:05:02.289000 audit[2910]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400074a7c0 a1=400063ed38 a2=400090e840 a3=25 items=0 ppid=1 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:02.297428 kubelet[2910]: I0913 00:05:02.297334 2910 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:05:02.297567 kubelet[2910]: I0913 00:05:02.297436 2910 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:05:02.289000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:05:02.297869 kubelet[2910]: I0913 00:05:02.297832 2910 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:05:02.298030 kubelet[2910]: I0913 00:05:02.298005 2910 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:05:02.302578 kubelet[2910]: I0913 00:05:02.302494 2910 server.go:317] "Adding debug handlers to kubelet server" Sep 13 00:05:02.311226 kubelet[2910]: I0913 00:05:02.311053 2910 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:05:02.319536 kubelet[2910]: I0913 00:05:02.319469 2910 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:05:02.327672 kubelet[2910]: I0913 00:05:02.327632 2910 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:05:02.328144 kubelet[2910]: I0913 00:05:02.328119 2910 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:05:02.330861 kubelet[2910]: I0913 00:05:02.328729 2910 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 13 00:05:02.332351 kubelet[2910]: I0913 00:05:02.332306 2910 factory.go:223] Registration of the systemd container factory successfully Sep 13 00:05:02.332776 kubelet[2910]: I0913 00:05:02.332736 2910 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:05:02.344547 kubelet[2910]: E0913 00:05:02.344468 2910 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:05:02.356663 kubelet[2910]: I0913 00:05:02.356601 2910 factory.go:223] Registration of the containerd container factory successfully Sep 13 00:05:02.400375 kubelet[2910]: I0913 00:05:02.400331 2910 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 13 00:05:02.400691 kubelet[2910]: I0913 00:05:02.400660 2910 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 13 00:05:02.400893 kubelet[2910]: I0913 00:05:02.400861 2910 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:05:02.401094 kubelet[2910]: I0913 00:05:02.401064 2910 kubelet.go:2436] "Starting kubelet main sync loop" Sep 13 00:05:02.401358 kubelet[2910]: E0913 00:05:02.401299 2910 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Sep 13 00:05:02.502079 kubelet[2910]: E0913 00:05:02.502031 2910 kubelet.go:2460] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Sep 13 00:05:02.512335 kubelet[2910]: I0913 00:05:02.512301 2910 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:05:02.512548 kubelet[2910]: I0913 00:05:02.512503 2910 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:05:02.512672 kubelet[2910]: I0913 00:05:02.512651 2910 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:05:02.513118 kubelet[2910]: I0913 00:05:02.513090 2910 state_mem.go:88] "Updated default CPUSet" cpuSet="" Sep 13 00:05:02.513297 kubelet[2910]: I0913 00:05:02.513258 2910 state_mem.go:96] "Updated CPUSet assignments" assignments={} Sep 13 00:05:02.513402 kubelet[2910]: I0913 00:05:02.513382 2910 policy_none.go:49] "None policy: Start" Sep 13 00:05:02.513551 kubelet[2910]: I0913 00:05:02.513490 2910 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:05:02.513668 kubelet[2910]: I0913 00:05:02.513648 2910 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:05:02.513985 kubelet[2910]: I0913 00:05:02.513963 2910 state_mem.go:75] "Updated machine memory state" Sep 13 00:05:02.525000 audit[2910]: AVC avc: denied { mac_admin } for pid=2910 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:02.525000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:05:02.525000 audit[2910]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008c0f00 a1=4000a945d0 a2=40008c0ed0 a3=25 items=0 ppid=1 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:02.525000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:05:02.528359 kubelet[2910]: E0913 00:05:02.526919 2910 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 13 00:05:02.528359 kubelet[2910]: E0913 00:05:02.527047 2910 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 13 00:05:02.528359 kubelet[2910]: I0913 00:05:02.527331 2910 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:05:02.528359 kubelet[2910]: I0913 00:05:02.527358 2910 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:05:02.530536 kubelet[2910]: I0913 00:05:02.529714 2910 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:05:02.544879 kubelet[2910]: E0913 00:05:02.541096 2910 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:05:02.649148 kubelet[2910]: I0913 00:05:02.648980 2910 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-27-21" Sep 13 00:05:02.679308 kubelet[2910]: I0913 00:05:02.678311 2910 kubelet_node_status.go:124] "Node was previously registered" node="ip-172-31-27-21" Sep 13 00:05:02.679308 kubelet[2910]: I0913 00:05:02.678541 2910 kubelet_node_status.go:78] "Successfully registered node" node="ip-172-31-27-21" Sep 13 00:05:02.705403 kubelet[2910]: I0913 00:05:02.704124 2910 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:05:02.705403 kubelet[2910]: I0913 00:05:02.704991 2910 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:05:02.705782 kubelet[2910]: I0913 00:05:02.705723 2910 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-27-21" Sep 13 00:05:02.737441 kubelet[2910]: I0913 00:05:02.737377 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6bbfe407bd618d95f976b7be499a30f1-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-21\" (UID: \"6bbfe407bd618d95f976b7be499a30f1\") " pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:05:02.737770 kubelet[2910]: I0913 00:05:02.737725 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:05:02.738027 kubelet[2910]: I0913 00:05:02.737971 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:05:02.738299 kubelet[2910]: I0913 00:05:02.738253 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:05:02.738492 kubelet[2910]: I0913 00:05:02.738462 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:05:02.738765 kubelet[2910]: I0913 00:05:02.738676 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/aa3129e6d91c130603d4f0abcbc1abd6-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-21\" (UID: \"aa3129e6d91c130603d4f0abcbc1abd6\") " pod="kube-system/kube-controller-manager-ip-172-31-27-21" Sep 13 00:05:02.738989 kubelet[2910]: I0913 00:05:02.738953 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/92fae504a24ca66e07705b25237163e4-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-21\" (UID: \"92fae504a24ca66e07705b25237163e4\") " pod="kube-system/kube-scheduler-ip-172-31-27-21" Sep 13 00:05:02.740643 kubelet[2910]: I0913 00:05:02.739185 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6bbfe407bd618d95f976b7be499a30f1-ca-certs\") pod \"kube-apiserver-ip-172-31-27-21\" (UID: \"6bbfe407bd618d95f976b7be499a30f1\") " pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:05:02.740967 kubelet[2910]: I0913 00:05:02.740923 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6bbfe407bd618d95f976b7be499a30f1-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-21\" (UID: \"6bbfe407bd618d95f976b7be499a30f1\") " pod="kube-system/kube-apiserver-ip-172-31-27-21" Sep 13 00:05:03.244947 kubelet[2910]: I0913 00:05:03.244875 2910 apiserver.go:52] "Watching apiserver" Sep 13 00:05:03.331726 kubelet[2910]: I0913 00:05:03.331640 2910 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:05:03.563971 kubelet[2910]: I0913 00:05:03.563630 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-27-21" podStartSLOduration=1.563382044 podStartE2EDuration="1.563382044s" podCreationTimestamp="2025-09-13 00:05:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:05:03.514948334 +0000 UTC m=+1.446186271" watchObservedRunningTime="2025-09-13 00:05:03.563382044 +0000 UTC m=+1.494619573" Sep 13 00:05:03.617295 kubelet[2910]: I0913 00:05:03.614901 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-27-21" podStartSLOduration=1.6148742889999999 podStartE2EDuration="1.614874289s" podCreationTimestamp="2025-09-13 00:05:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:05:03.564209794 +0000 UTC m=+1.495447395" watchObservedRunningTime="2025-09-13 00:05:03.614874289 +0000 UTC m=+1.546111818" Sep 13 00:05:04.748228 kernel: kauditd_printk_skb: 272 callbacks suppressed Sep 13 00:05:04.748468 kernel: audit: type=1400 audit(1757721904.735:820): avc: denied { watch } for pid=2594 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 13 00:05:04.735000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Sep 13 00:05:04.735000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000bca7c0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:04.761622 kernel: audit: type=1300 audit(1757721904.735:820): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000bca7c0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:04.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:04.773574 kernel: audit: type=1327 audit(1757721904.735:820): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:05.583000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:05.586000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:05.605043 kernel: audit: type=1400 audit(1757721905.583:821): avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:05.605227 kernel: audit: type=1400 audit(1757721905.586:822): avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:05.605295 kernel: audit: type=1300 audit(1757721905.586:822): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400088d440 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:05.586000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400088d440 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:05.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:05.629218 kernel: audit: type=1327 audit(1757721905.586:822): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:05.587000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:05.640074 kernel: audit: type=1400 audit(1757721905.587:823): avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:05.587000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400088d540 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:05.653574 kernel: audit: type=1300 audit(1757721905.587:823): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400088d540 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:05.653812 kernel: audit: type=1327 audit(1757721905.587:823): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:05.587000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:05.587000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:05.587000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400088d5c0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:05.587000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:05.583000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40001577a0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:05.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:06.147068 kubelet[2910]: I0913 00:05:06.146931 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-27-21" podStartSLOduration=4.146906647 podStartE2EDuration="4.146906647s" podCreationTimestamp="2025-09-13 00:05:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:05:03.618712007 +0000 UTC m=+1.549949524" watchObservedRunningTime="2025-09-13 00:05:06.146906647 +0000 UTC m=+4.078144164" Sep 13 00:05:08.457874 kubelet[2910]: I0913 00:05:08.457804 2910 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Sep 13 00:05:08.458813 env[1800]: time="2025-09-13T00:05:08.458735763Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:05:08.459330 kubelet[2910]: I0913 00:05:08.459214 2910 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Sep 13 00:05:08.971481 amazon-ssm-agent[1780]: 2025-09-13 00:05:08 INFO [HealthCheck] HealthCheck reporting agent health. Sep 13 00:05:09.316153 systemd[1]: Created slice kubepods-besteffort-poded85a3dd_9b9c_4daa_ad92_4fcf643a7cb6.slice. Sep 13 00:05:09.391114 kubelet[2910]: I0913 00:05:09.391044 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6-kube-proxy\") pod \"kube-proxy-pgljm\" (UID: \"ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6\") " pod="kube-system/kube-proxy-pgljm" Sep 13 00:05:09.391303 kubelet[2910]: I0913 00:05:09.391144 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6-xtables-lock\") pod \"kube-proxy-pgljm\" (UID: \"ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6\") " pod="kube-system/kube-proxy-pgljm" Sep 13 00:05:09.391303 kubelet[2910]: I0913 00:05:09.391228 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6-lib-modules\") pod \"kube-proxy-pgljm\" (UID: \"ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6\") " pod="kube-system/kube-proxy-pgljm" Sep 13 00:05:09.391455 kubelet[2910]: I0913 00:05:09.391277 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-md2tg\" (UniqueName: \"kubernetes.io/projected/ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6-kube-api-access-md2tg\") pod \"kube-proxy-pgljm\" (UID: \"ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6\") " pod="kube-system/kube-proxy-pgljm" Sep 13 00:05:09.496998 systemd[1]: Created slice kubepods-besteffort-pod95e6604e_1601_4180_868e_2ff6a83b6ac3.slice. Sep 13 00:05:09.529176 kubelet[2910]: I0913 00:05:09.529129 2910 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:05:09.592289 kubelet[2910]: I0913 00:05:09.592123 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fqqzw\" (UniqueName: \"kubernetes.io/projected/95e6604e-1601-4180-868e-2ff6a83b6ac3-kube-api-access-fqqzw\") pod \"tigera-operator-755d956888-p9tsq\" (UID: \"95e6604e-1601-4180-868e-2ff6a83b6ac3\") " pod="tigera-operator/tigera-operator-755d956888-p9tsq" Sep 13 00:05:09.592289 kubelet[2910]: I0913 00:05:09.592211 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/95e6604e-1601-4180-868e-2ff6a83b6ac3-var-lib-calico\") pod \"tigera-operator-755d956888-p9tsq\" (UID: \"95e6604e-1601-4180-868e-2ff6a83b6ac3\") " pod="tigera-operator/tigera-operator-755d956888-p9tsq" Sep 13 00:05:09.634584 env[1800]: time="2025-09-13T00:05:09.633950601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pgljm,Uid:ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6,Namespace:kube-system,Attempt:0,}" Sep 13 00:05:09.663023 env[1800]: time="2025-09-13T00:05:09.662890371Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:05:09.663323 env[1800]: time="2025-09-13T00:05:09.663256475Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:05:09.663597 env[1800]: time="2025-09-13T00:05:09.663493912Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:05:09.664140 env[1800]: time="2025-09-13T00:05:09.664046104Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eacab581f64b2f6778a6ea1b41d044eb6221c0720da5bd7551150e856ad23076 pid=2967 runtime=io.containerd.runc.v2 Sep 13 00:05:09.710402 systemd[1]: run-containerd-runc-k8s.io-eacab581f64b2f6778a6ea1b41d044eb6221c0720da5bd7551150e856ad23076-runc.YALyVP.mount: Deactivated successfully. Sep 13 00:05:09.722729 systemd[1]: Started cri-containerd-eacab581f64b2f6778a6ea1b41d044eb6221c0720da5bd7551150e856ad23076.scope. Sep 13 00:05:09.767598 kernel: kauditd_printk_skb: 5 callbacks suppressed Sep 13 00:05:09.767755 kernel: audit: type=1400 audit(1757721909.763:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.783686 kernel: audit: type=1400 audit(1757721909.763:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.791630 kernel: audit: type=1400 audit(1757721909.763:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.799567 kernel: audit: type=1400 audit(1757721909.763:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.808385 kernel: audit: type=1400 audit(1757721909.763:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.809266 env[1800]: time="2025-09-13T00:05:09.809165396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-p9tsq,Uid:95e6604e-1601-4180-868e-2ff6a83b6ac3,Namespace:tigera-operator,Attempt:0,}" Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.817573 kernel: audit: type=1400 audit(1757721909.763:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.827147 kernel: audit: type=1400 audit(1757721909.763:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.841376 kernel: audit: type=1400 audit(1757721909.763:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.850903 kernel: audit: type=1400 audit(1757721909.763:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.860119 kernel: audit: type=1400 audit(1757721909.765:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.765000 audit: BPF prog-id=109 op=LOAD Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2967 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636162353831663634623266363737386136656131623431643034 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2967 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636162353831663634623266363737386136656131623431643034 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.773000 audit: BPF prog-id=110 op=LOAD Sep 13 00:05:09.773000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2967 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636162353831663634623266363737386136656131623431643034 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit: BPF prog-id=111 op=LOAD Sep 13 00:05:09.774000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2967 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636162353831663634623266363737386136656131623431643034 Sep 13 00:05:09.774000 audit: BPF prog-id=111 op=UNLOAD Sep 13 00:05:09.774000 audit: BPF prog-id=110 op=UNLOAD Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.774000 audit: BPF prog-id=112 op=LOAD Sep 13 00:05:09.774000 audit[2976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2967 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636162353831663634623266363737386136656131623431643034 Sep 13 00:05:09.871849 env[1800]: time="2025-09-13T00:05:09.871693714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pgljm,Uid:ed85a3dd-9b9c-4daa-ad92-4fcf643a7cb6,Namespace:kube-system,Attempt:0,} returns sandbox id \"eacab581f64b2f6778a6ea1b41d044eb6221c0720da5bd7551150e856ad23076\"" Sep 13 00:05:09.882015 env[1800]: time="2025-09-13T00:05:09.880478798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:05:09.882015 env[1800]: time="2025-09-13T00:05:09.880607549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:05:09.882015 env[1800]: time="2025-09-13T00:05:09.880634573Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:05:09.882015 env[1800]: time="2025-09-13T00:05:09.881070782Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e396d7a5a889b72b50477d3f2f06b09d5a8a4a79a88d384812f51aff3a087a7 pid=3012 runtime=io.containerd.runc.v2 Sep 13 00:05:09.883162 env[1800]: time="2025-09-13T00:05:09.883071260Z" level=info msg="CreateContainer within sandbox \"eacab581f64b2f6778a6ea1b41d044eb6221c0720da5bd7551150e856ad23076\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:05:09.913024 systemd[1]: Started cri-containerd-7e396d7a5a889b72b50477d3f2f06b09d5a8a4a79a88d384812f51aff3a087a7.scope. Sep 13 00:05:09.920407 env[1800]: time="2025-09-13T00:05:09.920187066Z" level=info msg="CreateContainer within sandbox \"eacab581f64b2f6778a6ea1b41d044eb6221c0720da5bd7551150e856ad23076\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a9813420f7c262cd8a0e893f97c5f5195745ecc0b0c69ea6842aeb4436d2f1a7\"" Sep 13 00:05:09.923591 env[1800]: time="2025-09-13T00:05:09.922865786Z" level=info msg="StartContainer for \"a9813420f7c262cd8a0e893f97c5f5195745ecc0b0c69ea6842aeb4436d2f1a7\"" Sep 13 00:05:09.974310 systemd[1]: Started cri-containerd-a9813420f7c262cd8a0e893f97c5f5195745ecc0b0c69ea6842aeb4436d2f1a7.scope. Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.991000 audit: BPF prog-id=113 op=LOAD Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=3012 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333936643761356138383962373262353034373764336632663036 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3012 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333936643761356138383962373262353034373764336632663036 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit: BPF prog-id=114 op=LOAD Sep 13 00:05:09.992000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3012 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333936643761356138383962373262353034373764336632663036 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.992000 audit: BPF prog-id=115 op=LOAD Sep 13 00:05:09.992000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3012 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333936643761356138383962373262353034373764336632663036 Sep 13 00:05:09.993000 audit: BPF prog-id=115 op=UNLOAD Sep 13 00:05:09.993000 audit: BPF prog-id=114 op=UNLOAD Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { perfmon } for pid=3023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit[3023]: AVC avc: denied { bpf } for pid=3023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:09.993000 audit: BPF prog-id=116 op=LOAD Sep 13 00:05:09.993000 audit[3023]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3012 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:09.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765333936643761356138383962373262353034373764336632663036 Sep 13 00:05:10.054047 env[1800]: time="2025-09-13T00:05:10.053952238Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-755d956888-p9tsq,Uid:95e6604e-1601-4180-868e-2ff6a83b6ac3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"7e396d7a5a889b72b50477d3f2f06b09d5a8a4a79a88d384812f51aff3a087a7\"" Sep 13 00:05:10.061855 env[1800]: time="2025-09-13T00:05:10.061769036Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\"" Sep 13 00:05:10.083000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.083000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2967 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139383133343230663763323632636438613065383933663937633566 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.084000 audit: BPF prog-id=117 op=LOAD Sep 13 00:05:10.084000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2967 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139383133343230663763323632636438613065383933663937633566 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.085000 audit: BPF prog-id=118 op=LOAD Sep 13 00:05:10.085000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2967 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139383133343230663763323632636438613065383933663937633566 Sep 13 00:05:10.086000 audit: BPF prog-id=118 op=UNLOAD Sep 13 00:05:10.086000 audit: BPF prog-id=117 op=UNLOAD Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:10.087000 audit: BPF prog-id=119 op=LOAD Sep 13 00:05:10.087000 audit[3040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2967 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139383133343230663763323632636438613065383933663937633566 Sep 13 00:05:10.116881 env[1800]: time="2025-09-13T00:05:10.116677927Z" level=info msg="StartContainer for \"a9813420f7c262cd8a0e893f97c5f5195745ecc0b0c69ea6842aeb4436d2f1a7\" returns successfully" Sep 13 00:05:10.397000 audit[3116]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.397000 audit[3116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9aebae0 a2=0 a3=1 items=0 ppid=3059 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:05:10.400000 audit[3118]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.400000 audit[3118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9766930 a2=0 a3=1 items=0 ppid=3059 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:05:10.403000 audit[3119]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.403000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe48f8b50 a2=0 a3=1 items=0 ppid=3059 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:05:10.407000 audit[3120]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.407000 audit[3120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc405d120 a2=0 a3=1 items=0 ppid=3059 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:05:10.410000 audit[3121]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=3121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.410000 audit[3121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb38fa30 a2=0 a3=1 items=0 ppid=3059 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:05:10.426000 audit[3124]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.426000 audit[3124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed1751c0 a2=0 a3=1 items=0 ppid=3059 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:05:10.515000 audit[3125]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.515000 audit[3125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffdd38970 a2=0 a3=1 items=0 ppid=3059 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:05:10.523000 audit[3127]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.523000 audit[3127]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd4ea8820 a2=0 a3=1 items=0 ppid=3059 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:05:10.531000 audit[3130]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.531000 audit[3130]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc77183a0 a2=0 a3=1 items=0 ppid=3059 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.531000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:05:10.534000 audit[3131]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.534000 audit[3131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4c6c780 a2=0 a3=1 items=0 ppid=3059 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:05:10.557000 audit[3133]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.557000 audit[3133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc3553b90 a2=0 a3=1 items=0 ppid=3059 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:05:10.561000 audit[3134]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.561000 audit[3134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc458ba60 a2=0 a3=1 items=0 ppid=3059 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.561000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:05:10.570000 audit[3136]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.570000 audit[3136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffceca61e0 a2=0 a3=1 items=0 ppid=3059 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:05:10.581000 audit[3139]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.581000 audit[3139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff8dba0a0 a2=0 a3=1 items=0 ppid=3059 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:05:10.584000 audit[3140]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.584000 audit[3140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5daee20 a2=0 a3=1 items=0 ppid=3059 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:05:10.590000 audit[3142]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.590000 audit[3142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffedbccfc0 a2=0 a3=1 items=0 ppid=3059 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:05:10.593000 audit[3143]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.593000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd4e6f430 a2=0 a3=1 items=0 ppid=3059 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:05:10.599000 audit[3145]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.599000 audit[3145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd5f3a910 a2=0 a3=1 items=0 ppid=3059 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:05:10.608000 audit[3148]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.608000 audit[3148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdda04230 a2=0 a3=1 items=0 ppid=3059 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:05:10.619000 audit[3151]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.619000 audit[3151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffec012a80 a2=0 a3=1 items=0 ppid=3059 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:05:10.622000 audit[3152]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.622000 audit[3152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff5e2ae10 a2=0 a3=1 items=0 ppid=3059 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:05:10.630000 audit[3154]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.630000 audit[3154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffcc3b7760 a2=0 a3=1 items=0 ppid=3059 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:05:10.641000 audit[3157]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.641000 audit[3157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcde62eb0 a2=0 a3=1 items=0 ppid=3059 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:05:10.645000 audit[3158]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.645000 audit[3158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde10dd00 a2=0 a3=1 items=0 ppid=3059 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:05:10.651000 audit[3160]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:05:10.651000 audit[3160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffddba3290 a2=0 a3=1 items=0 ppid=3059 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.651000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:05:10.728000 audit[3166]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:10.728000 audit[3166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffe96c8250 a2=0 a3=1 items=0 ppid=3059 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:10.743000 audit[3166]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3166 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:10.743000 audit[3166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffe96c8250 a2=0 a3=1 items=0 ppid=3059 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:10.746000 audit[3171]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.746000 audit[3171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffccd85190 a2=0 a3=1 items=0 ppid=3059 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:05:10.753000 audit[3173]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.753000 audit[3173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffda4e2c0 a2=0 a3=1 items=0 ppid=3059 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:05:10.762000 audit[3176]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.762000 audit[3176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe384c9a0 a2=0 a3=1 items=0 ppid=3059 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:05:10.764000 audit[3177]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.764000 audit[3177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeff8e460 a2=0 a3=1 items=0 ppid=3059 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:05:10.770000 audit[3179]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.770000 audit[3179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcbfc2ff0 a2=0 a3=1 items=0 ppid=3059 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:05:10.772000 audit[3180]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.772000 audit[3180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5dafb70 a2=0 a3=1 items=0 ppid=3059 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:05:10.778000 audit[3182]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.778000 audit[3182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe4362170 a2=0 a3=1 items=0 ppid=3059 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:05:10.787000 audit[3185]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.787000 audit[3185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffa5481a0 a2=0 a3=1 items=0 ppid=3059 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:05:10.789000 audit[3186]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.789000 audit[3186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3e96cf0 a2=0 a3=1 items=0 ppid=3059 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.789000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:05:10.797000 audit[3188]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.797000 audit[3188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe3152230 a2=0 a3=1 items=0 ppid=3059 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:05:10.800000 audit[3189]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.800000 audit[3189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc3728d60 a2=0 a3=1 items=0 ppid=3059 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:05:10.806000 audit[3191]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.806000 audit[3191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe0b20220 a2=0 a3=1 items=0 ppid=3059 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:05:10.815000 audit[3194]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.815000 audit[3194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5e4fa20 a2=0 a3=1 items=0 ppid=3059 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.815000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:05:10.828000 audit[3197]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.828000 audit[3197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff4fb2ab0 a2=0 a3=1 items=0 ppid=3059 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:05:10.830000 audit[3198]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.830000 audit[3198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffea8c5c90 a2=0 a3=1 items=0 ppid=3059 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:05:10.836000 audit[3200]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.836000 audit[3200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff92e13c0 a2=0 a3=1 items=0 ppid=3059 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:05:10.845000 audit[3203]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.845000 audit[3203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffddca9150 a2=0 a3=1 items=0 ppid=3059 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:05:10.849000 audit[3204]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.849000 audit[3204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdbd35df0 a2=0 a3=1 items=0 ppid=3059 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:05:10.856000 audit[3206]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.856000 audit[3206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff17c6b70 a2=0 a3=1 items=0 ppid=3059 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:05:10.860000 audit[3207]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.860000 audit[3207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef458340 a2=0 a3=1 items=0 ppid=3059 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:05:10.866000 audit[3209]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.866000 audit[3209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff55e87f0 a2=0 a3=1 items=0 ppid=3059 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:05:10.877000 audit[3212]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:05:10.877000 audit[3212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd32bda80 a2=0 a3=1 items=0 ppid=3059 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:05:10.887000 audit[3214]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:05:10.887000 audit[3214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffeea62a10 a2=0 a3=1 items=0 ppid=3059 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.887000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:10.889000 audit[3214]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:05:10.889000 audit[3214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffeea62a10 a2=0 a3=1 items=0 ppid=3059 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:10.889000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:11.359750 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1434663517.mount: Deactivated successfully. Sep 13 00:05:12.537299 env[1800]: time="2025-09-13T00:05:12.537229647Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:12.539640 env[1800]: time="2025-09-13T00:05:12.539568499Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd2e197838b00861b08ae5f480dfbfb9a519722e35ced99346315722309cbe9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:12.543810 env[1800]: time="2025-09-13T00:05:12.543758912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:12.548775 env[1800]: time="2025-09-13T00:05:12.548694705Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:00a7a9b62f9b9a4e0856128b078539783b8352b07f707bff595cb604cc580f6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:12.550317 env[1800]: time="2025-09-13T00:05:12.550255068Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.6\" returns image reference \"sha256:dd2e197838b00861b08ae5f480dfbfb9a519722e35ced99346315722309cbe9f\"" Sep 13 00:05:12.561674 env[1800]: time="2025-09-13T00:05:12.561582411Z" level=info msg="CreateContainer within sandbox \"7e396d7a5a889b72b50477d3f2f06b09d5a8a4a79a88d384812f51aff3a087a7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Sep 13 00:05:12.596811 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3823750290.mount: Deactivated successfully. Sep 13 00:05:12.614429 env[1800]: time="2025-09-13T00:05:12.614338910Z" level=info msg="CreateContainer within sandbox \"7e396d7a5a889b72b50477d3f2f06b09d5a8a4a79a88d384812f51aff3a087a7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5\"" Sep 13 00:05:12.616153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount487724083.mount: Deactivated successfully. Sep 13 00:05:12.622208 env[1800]: time="2025-09-13T00:05:12.622038123Z" level=info msg="StartContainer for \"6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5\"" Sep 13 00:05:12.647948 kubelet[2910]: I0913 00:05:12.647854 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-pgljm" podStartSLOduration=3.6478296759999997 podStartE2EDuration="3.647829676s" podCreationTimestamp="2025-09-13 00:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:05:10.498665217 +0000 UTC m=+8.429902734" watchObservedRunningTime="2025-09-13 00:05:12.647829676 +0000 UTC m=+10.579067193" Sep 13 00:05:12.692544 systemd[1]: Started cri-containerd-6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5.scope. Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.740000 audit: BPF prog-id=120 op=LOAD Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3012 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:12.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633731386533346638386533323338633433663730646232383737 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3012 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:12.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633731386533346638386533323338633433663730646232383737 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit: BPF prog-id=121 op=LOAD Sep 13 00:05:12.741000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3012 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:12.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633731386533346638386533323338633433663730646232383737 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.741000 audit: BPF prog-id=122 op=LOAD Sep 13 00:05:12.741000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3012 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:12.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633731386533346638386533323338633433663730646232383737 Sep 13 00:05:12.742000 audit: BPF prog-id=122 op=UNLOAD Sep 13 00:05:12.742000 audit: BPF prog-id=121 op=UNLOAD Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { perfmon } for pid=3223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit[3223]: AVC avc: denied { bpf } for pid=3223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:12.742000 audit: BPF prog-id=123 op=LOAD Sep 13 00:05:12.742000 audit[3223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3012 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:12.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633731386533346638386533323338633433663730646232383737 Sep 13 00:05:12.770933 env[1800]: time="2025-09-13T00:05:12.770840620Z" level=info msg="StartContainer for \"6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5\" returns successfully" Sep 13 00:05:13.501268 kubelet[2910]: I0913 00:05:13.501170 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-755d956888-p9tsq" podStartSLOduration=2.007021783 podStartE2EDuration="4.50114402s" podCreationTimestamp="2025-09-13 00:05:09 +0000 UTC" firstStartedPulling="2025-09-13 00:05:10.058315548 +0000 UTC m=+7.989553065" lastFinishedPulling="2025-09-13 00:05:12.552437785 +0000 UTC m=+10.483675302" observedRunningTime="2025-09-13 00:05:13.500345623 +0000 UTC m=+11.431583164" watchObservedRunningTime="2025-09-13 00:05:13.50114402 +0000 UTC m=+11.432381549" Sep 13 00:05:17.403795 systemd[1]: cri-containerd-6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5.scope: Deactivated successfully. Sep 13 00:05:17.403000 audit: BPF prog-id=120 op=UNLOAD Sep 13 00:05:17.406716 kernel: kauditd_printk_skb: 357 callbacks suppressed Sep 13 00:05:17.406777 kernel: audit: type=1334 audit(1757721917.403:936): prog-id=120 op=UNLOAD Sep 13 00:05:17.410000 audit: BPF prog-id=123 op=UNLOAD Sep 13 00:05:17.413933 kernel: audit: type=1334 audit(1757721917.410:937): prog-id=123 op=UNLOAD Sep 13 00:05:17.474238 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5-rootfs.mount: Deactivated successfully. Sep 13 00:05:17.625803 env[1800]: time="2025-09-13T00:05:17.625734645Z" level=info msg="shim disconnected" id=6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5 Sep 13 00:05:17.626714 env[1800]: time="2025-09-13T00:05:17.626647796Z" level=warning msg="cleaning up after shim disconnected" id=6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5 namespace=k8s.io Sep 13 00:05:17.626911 env[1800]: time="2025-09-13T00:05:17.626869679Z" level=info msg="cleaning up dead shim" Sep 13 00:05:17.648488 env[1800]: time="2025-09-13T00:05:17.648426700Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:05:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3273 runtime=io.containerd.runc.v2\n" Sep 13 00:05:18.507089 kubelet[2910]: I0913 00:05:18.507026 2910 scope.go:117] "RemoveContainer" containerID="6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5" Sep 13 00:05:18.515566 env[1800]: time="2025-09-13T00:05:18.515096323Z" level=info msg="CreateContainer within sandbox \"7e396d7a5a889b72b50477d3f2f06b09d5a8a4a79a88d384812f51aff3a087a7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Sep 13 00:05:18.538132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1707135208.mount: Deactivated successfully. Sep 13 00:05:18.558787 env[1800]: time="2025-09-13T00:05:18.558706898Z" level=info msg="CreateContainer within sandbox \"7e396d7a5a889b72b50477d3f2f06b09d5a8a4a79a88d384812f51aff3a087a7\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b\"" Sep 13 00:05:18.563392 env[1800]: time="2025-09-13T00:05:18.563315816Z" level=info msg="StartContainer for \"d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b\"" Sep 13 00:05:18.657733 systemd[1]: Started cri-containerd-d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b.scope. Sep 13 00:05:18.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.741033 kernel: audit: type=1400 audit(1757721918.714:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.741233 kernel: audit: type=1400 audit(1757721918.726:939): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.758900 kernel: audit: type=1400 audit(1757721918.726:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.781501 kernel: audit: type=1400 audit(1757721918.726:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.796819 kernel: audit: type=1400 audit(1757721918.726:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.808079 kernel: audit: type=1400 audit(1757721918.726:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.824008 kernel: audit: type=1400 audit(1757721918.726:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.841822 kernel: audit: type=1400 audit(1757721918.726:945): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.726000 audit: BPF prog-id=124 op=LOAD Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3012 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:18.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653866326536346632316338376666393763393761383835666366 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3012 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:18.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653866326536346632316338376666393763393761383835666366 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit: BPF prog-id=125 op=LOAD Sep 13 00:05:18.727000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3012 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:18.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653866326536346632316338376666393763393761383835666366 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.727000 audit: BPF prog-id=126 op=LOAD Sep 13 00:05:18.727000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3012 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:18.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653866326536346632316338376666393763393761383835666366 Sep 13 00:05:18.727000 audit: BPF prog-id=126 op=UNLOAD Sep 13 00:05:18.728000 audit: BPF prog-id=125 op=UNLOAD Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { perfmon } for pid=3311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit[3311]: AVC avc: denied { bpf } for pid=3311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:18.728000 audit: BPF prog-id=127 op=LOAD Sep 13 00:05:18.728000 audit[3311]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3012 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:18.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438653866326536346632316338376666393763393761383835666366 Sep 13 00:05:19.001647 env[1800]: time="2025-09-13T00:05:19.001577753Z" level=info msg="StartContainer for \"d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b\" returns successfully" Sep 13 00:05:21.984601 sudo[2079]: pam_unix(sudo:session): session closed for user root Sep 13 00:05:21.984000 audit[2079]: USER_END pid=2079 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:21.985000 audit[2079]: CRED_DISP pid=2079 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:05:22.011334 sshd[2076]: pam_unix(sshd:session): session closed for user core Sep 13 00:05:22.013000 audit[2076]: USER_END pid=2076 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:22.013000 audit[2076]: CRED_DISP pid=2076 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:05:22.018610 systemd-logind[1793]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:05:22.018893 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:05:22.019214 systemd[1]: session-7.scope: Consumed 13.956s CPU time. Sep 13 00:05:22.021034 systemd[1]: sshd@6-172.31.27.21:22-139.178.89.65:45396.service: Deactivated successfully. Sep 13 00:05:22.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.21:22-139.178.89.65:45396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:05:22.027871 systemd-logind[1793]: Removed session 7. Sep 13 00:05:28.325000 audit[3363]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:28.328384 kernel: kauditd_printk_skb: 54 callbacks suppressed Sep 13 00:05:28.328554 kernel: audit: type=1325 audit(1757721928.325:961): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:28.325000 audit[3363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc4829870 a2=0 a3=1 items=0 ppid=3059 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:28.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:28.377247 kernel: audit: type=1300 audit(1757721928.325:961): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc4829870 a2=0 a3=1 items=0 ppid=3059 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:28.377423 kernel: audit: type=1327 audit(1757721928.325:961): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:28.372000 audit[3363]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:28.384292 kernel: audit: type=1325 audit(1757721928.372:962): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:28.372000 audit[3363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc4829870 a2=0 a3=1 items=0 ppid=3059 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:28.400480 kernel: audit: type=1300 audit(1757721928.372:962): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc4829870 a2=0 a3=1 items=0 ppid=3059 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:28.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:28.411209 kernel: audit: type=1327 audit(1757721928.372:962): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:28.454000 audit[3365]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:28.461537 kernel: audit: type=1325 audit(1757721928.454:963): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:28.461688 kernel: audit: type=1300 audit(1757721928.454:963): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff07d0730 a2=0 a3=1 items=0 ppid=3059 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:28.454000 audit[3365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffff07d0730 a2=0 a3=1 items=0 ppid=3059 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:28.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:28.481969 kernel: audit: type=1327 audit(1757721928.454:963): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:28.551000 audit[3365]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:28.558738 kernel: audit: type=1325 audit(1757721928.551:964): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3365 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:28.551000 audit[3365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff07d0730 a2=0 a3=1 items=0 ppid=3059 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:28.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:38.791872 systemd[1]: Created slice kubepods-besteffort-pod122a6e61_721c_4590_b6fc_55e0fc86f557.slice. Sep 13 00:05:38.808012 kubelet[2910]: I0913 00:05:38.807926 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prrf9\" (UniqueName: \"kubernetes.io/projected/122a6e61-721c-4590-b6fc-55e0fc86f557-kube-api-access-prrf9\") pod \"calico-typha-697b8c5bdb-h4t44\" (UID: \"122a6e61-721c-4590-b6fc-55e0fc86f557\") " pod="calico-system/calico-typha-697b8c5bdb-h4t44" Sep 13 00:05:38.808654 kubelet[2910]: I0913 00:05:38.808022 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/122a6e61-721c-4590-b6fc-55e0fc86f557-tigera-ca-bundle\") pod \"calico-typha-697b8c5bdb-h4t44\" (UID: \"122a6e61-721c-4590-b6fc-55e0fc86f557\") " pod="calico-system/calico-typha-697b8c5bdb-h4t44" Sep 13 00:05:38.808654 kubelet[2910]: I0913 00:05:38.808064 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/122a6e61-721c-4590-b6fc-55e0fc86f557-typha-certs\") pod \"calico-typha-697b8c5bdb-h4t44\" (UID: \"122a6e61-721c-4590-b6fc-55e0fc86f557\") " pod="calico-system/calico-typha-697b8c5bdb-h4t44" Sep 13 00:05:38.880000 audit[3367]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:38.883157 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 13 00:05:38.883316 kernel: audit: type=1325 audit(1757721938.880:965): table=filter:93 family=2 entries=17 op=nft_register_rule pid=3367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:38.880000 audit[3367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc71110c0 a2=0 a3=1 items=0 ppid=3059 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:38.901845 kernel: audit: type=1300 audit(1757721938.880:965): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffc71110c0 a2=0 a3=1 items=0 ppid=3059 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:38.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:38.909062 kernel: audit: type=1327 audit(1757721938.880:965): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:38.936000 audit[3367]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:38.943629 kernel: audit: type=1325 audit(1757721938.936:966): table=nat:94 family=2 entries=12 op=nft_register_rule pid=3367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:38.936000 audit[3367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc71110c0 a2=0 a3=1 items=0 ppid=3059 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:38.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:38.981477 kernel: audit: type=1300 audit(1757721938.936:966): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc71110c0 a2=0 a3=1 items=0 ppid=3059 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:38.981633 kernel: audit: type=1327 audit(1757721938.936:966): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:39.004000 audit[3371]: NETFILTER_CFG table=filter:95 family=2 entries=19 op=nft_register_rule pid=3371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:39.015591 kernel: audit: type=1325 audit(1757721939.004:967): table=filter:95 family=2 entries=19 op=nft_register_rule pid=3371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:39.004000 audit[3371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffcf266230 a2=0 a3=1 items=0 ppid=3059 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:39.029577 kernel: audit: type=1300 audit(1757721939.004:967): arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffcf266230 a2=0 a3=1 items=0 ppid=3059 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:39.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:39.035000 audit[3371]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:39.042349 kernel: audit: type=1327 audit(1757721939.004:967): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:39.042470 kernel: audit: type=1325 audit(1757721939.035:968): table=nat:96 family=2 entries=12 op=nft_register_rule pid=3371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:39.035000 audit[3371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcf266230 a2=0 a3=1 items=0 ppid=3059 pid=3371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:39.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:39.099250 env[1800]: time="2025-09-13T00:05:39.098668911Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-697b8c5bdb-h4t44,Uid:122a6e61-721c-4590-b6fc-55e0fc86f557,Namespace:calico-system,Attempt:0,}" Sep 13 00:05:39.140792 env[1800]: time="2025-09-13T00:05:39.140412477Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:05:39.140964 env[1800]: time="2025-09-13T00:05:39.140839570Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:05:39.141037 env[1800]: time="2025-09-13T00:05:39.140940011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:05:39.141428 env[1800]: time="2025-09-13T00:05:39.141315876Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/091f059cfba8c12bf0a06ccf2d6de4b34cb49560b58492dc54ed47decbe9217d pid=3379 runtime=io.containerd.runc.v2 Sep 13 00:05:39.208539 systemd[1]: Started cri-containerd-091f059cfba8c12bf0a06ccf2d6de4b34cb49560b58492dc54ed47decbe9217d.scope. Sep 13 00:05:39.585132 systemd[1]: Created slice kubepods-besteffort-pod440227af_e0a3_47c1_aa93_7e9ffbcf6778.slice. Sep 13 00:05:39.622893 kubelet[2910]: I0913 00:05:39.622815 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-policysync\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.623303 kubelet[2910]: I0913 00:05:39.623239 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-var-lib-calico\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.623739 kubelet[2910]: I0913 00:05:39.623671 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-flexvol-driver-host\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.623980 kubelet[2910]: I0913 00:05:39.623929 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6b7df\" (UniqueName: \"kubernetes.io/projected/440227af-e0a3-47c1-aa93-7e9ffbcf6778-kube-api-access-6b7df\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.624322 kubelet[2910]: I0913 00:05:39.624276 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-var-run-calico\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.624591 kubelet[2910]: I0913 00:05:39.624556 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-xtables-lock\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.624905 kubelet[2910]: I0913 00:05:39.624870 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-cni-log-dir\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.625165 kubelet[2910]: I0913 00:05:39.625134 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-cni-bin-dir\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.625433 kubelet[2910]: I0913 00:05:39.625402 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-lib-modules\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.625841 kubelet[2910]: I0913 00:05:39.625789 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/440227af-e0a3-47c1-aa93-7e9ffbcf6778-node-certs\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.626493 kubelet[2910]: I0913 00:05:39.626124 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/440227af-e0a3-47c1-aa93-7e9ffbcf6778-cni-net-dir\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.628585 kubelet[2910]: I0913 00:05:39.628498 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/440227af-e0a3-47c1-aa93-7e9ffbcf6778-tigera-ca-bundle\") pod \"calico-node-p2t5k\" (UID: \"440227af-e0a3-47c1-aa93-7e9ffbcf6778\") " pod="calico-system/calico-node-p2t5k" Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.679000 audit: BPF prog-id=128 op=LOAD Sep 13 00:05:39.680000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.680000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3379 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:39.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316630353963666261386331326266306130366363663264366465 Sep 13 00:05:39.680000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.680000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3379 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:39.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316630353963666261386331326266306130366363663264366465 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.681000 audit: BPF prog-id=129 op=LOAD Sep 13 00:05:39.681000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3379 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:39.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316630353963666261386331326266306130366363663264366465 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.683000 audit: BPF prog-id=130 op=LOAD Sep 13 00:05:39.683000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3379 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:39.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316630353963666261386331326266306130366363663264366465 Sep 13 00:05:39.684000 audit: BPF prog-id=130 op=UNLOAD Sep 13 00:05:39.684000 audit: BPF prog-id=129 op=UNLOAD Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:39.685000 audit: BPF prog-id=131 op=LOAD Sep 13 00:05:39.685000 audit[3389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3379 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:39.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039316630353963666261386331326266306130366363663264366465 Sep 13 00:05:39.734015 kubelet[2910]: E0913 00:05:39.733962 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.734285 kubelet[2910]: W0913 00:05:39.734212 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.734494 kubelet[2910]: E0913 00:05:39.734448 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.742938 kubelet[2910]: E0913 00:05:39.742888 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.743292 kubelet[2910]: W0913 00:05:39.743201 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.743540 kubelet[2910]: E0913 00:05:39.743473 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.762328 kubelet[2910]: E0913 00:05:39.762283 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.762646 kubelet[2910]: W0913 00:05:39.762593 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.762829 kubelet[2910]: E0913 00:05:39.762798 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.766676 kubelet[2910]: E0913 00:05:39.766614 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.767117 kubelet[2910]: W0913 00:05:39.767063 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.767399 kubelet[2910]: E0913 00:05:39.767326 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.790713 kubelet[2910]: E0913 00:05:39.790665 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.791000 kubelet[2910]: W0913 00:05:39.790956 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.791186 kubelet[2910]: E0913 00:05:39.791152 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.792992 kubelet[2910]: E0913 00:05:39.792942 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.793237 kubelet[2910]: W0913 00:05:39.793199 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.793375 kubelet[2910]: E0913 00:05:39.793347 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.797848 kubelet[2910]: E0913 00:05:39.797804 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.798087 kubelet[2910]: W0913 00:05:39.798046 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.798292 kubelet[2910]: E0913 00:05:39.798252 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.805444 env[1800]: time="2025-09-13T00:05:39.805386258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-697b8c5bdb-h4t44,Uid:122a6e61-721c-4590-b6fc-55e0fc86f557,Namespace:calico-system,Attempt:0,} returns sandbox id \"091f059cfba8c12bf0a06ccf2d6de4b34cb49560b58492dc54ed47decbe9217d\"" Sep 13 00:05:39.805886 kubelet[2910]: E0913 00:05:39.805856 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.806063 kubelet[2910]: W0913 00:05:39.806032 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.806229 kubelet[2910]: E0913 00:05:39.806202 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.806766 kubelet[2910]: E0913 00:05:39.806733 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.806940 kubelet[2910]: W0913 00:05:39.806908 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.807115 kubelet[2910]: E0913 00:05:39.807086 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.808482 kubelet[2910]: E0913 00:05:39.808443 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.809191 kubelet[2910]: W0913 00:05:39.809144 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.809382 kubelet[2910]: E0913 00:05:39.809345 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.812664 kubelet[2910]: E0913 00:05:39.812618 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.812902 kubelet[2910]: W0913 00:05:39.812861 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.813121 kubelet[2910]: E0913 00:05:39.813085 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.813879 kubelet[2910]: E0913 00:05:39.813839 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.814091 kubelet[2910]: W0913 00:05:39.814059 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.814250 kubelet[2910]: E0913 00:05:39.814217 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.814939 env[1800]: time="2025-09-13T00:05:39.814791910Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\"" Sep 13 00:05:39.815317 kubelet[2910]: E0913 00:05:39.815273 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.815605 kubelet[2910]: W0913 00:05:39.815564 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.815806 kubelet[2910]: E0913 00:05:39.815772 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.816347 kubelet[2910]: E0913 00:05:39.816311 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.816717 kubelet[2910]: W0913 00:05:39.816679 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.816961 kubelet[2910]: E0913 00:05:39.816923 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.819736 kubelet[2910]: E0913 00:05:39.819687 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.820025 kubelet[2910]: W0913 00:05:39.819981 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.820227 kubelet[2910]: E0913 00:05:39.820189 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.820955 kubelet[2910]: E0913 00:05:39.820904 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.821206 kubelet[2910]: W0913 00:05:39.821162 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.821401 kubelet[2910]: E0913 00:05:39.821361 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.822176 kubelet[2910]: E0913 00:05:39.822133 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.822450 kubelet[2910]: W0913 00:05:39.822406 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.823215 kubelet[2910]: E0913 00:05:39.823169 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.825690 kubelet[2910]: E0913 00:05:39.825636 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.825996 kubelet[2910]: W0913 00:05:39.825935 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.826220 kubelet[2910]: E0913 00:05:39.826172 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.827195 kubelet[2910]: E0913 00:05:39.827143 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:39.827631 kubelet[2910]: W0913 00:05:39.827579 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:39.827876 kubelet[2910]: E0913 00:05:39.827819 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:39.894701 env[1800]: time="2025-09-13T00:05:39.894477371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p2t5k,Uid:440227af-e0a3-47c1-aa93-7e9ffbcf6778,Namespace:calico-system,Attempt:0,}" Sep 13 00:05:39.913765 kubelet[2910]: E0913 00:05:39.913271 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tbpg" podUID="0a1b1282-a990-45e1-9198-e7947e011e69" Sep 13 00:05:39.933986 systemd[1]: run-containerd-runc-k8s.io-091f059cfba8c12bf0a06ccf2d6de4b34cb49560b58492dc54ed47decbe9217d-runc.Tyvtno.mount: Deactivated successfully. Sep 13 00:05:39.958600 env[1800]: time="2025-09-13T00:05:39.958440517Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:05:39.958986 env[1800]: time="2025-09-13T00:05:39.958898210Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:05:39.959220 env[1800]: time="2025-09-13T00:05:39.959161011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:05:39.969080 env[1800]: time="2025-09-13T00:05:39.966111324Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4 pid=3442 runtime=io.containerd.runc.v2 Sep 13 00:05:40.001424 kubelet[2910]: E0913 00:05:40.001357 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.001424 kubelet[2910]: W0913 00:05:40.001410 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.002244 kubelet[2910]: E0913 00:05:40.001447 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.002671 kubelet[2910]: E0913 00:05:40.002621 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.002850 kubelet[2910]: W0913 00:05:40.002664 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.002850 kubelet[2910]: E0913 00:05:40.002743 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.003389 kubelet[2910]: E0913 00:05:40.003321 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.003389 kubelet[2910]: W0913 00:05:40.003366 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.003678 kubelet[2910]: E0913 00:05:40.003400 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.004713 kubelet[2910]: E0913 00:05:40.004641 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.004713 kubelet[2910]: W0913 00:05:40.004689 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.004915 kubelet[2910]: E0913 00:05:40.004724 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.005496 kubelet[2910]: E0913 00:05:40.005317 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.005496 kubelet[2910]: W0913 00:05:40.005491 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.005747 kubelet[2910]: E0913 00:05:40.005550 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.006824 kubelet[2910]: E0913 00:05:40.006769 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.006824 kubelet[2910]: W0913 00:05:40.006815 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.007061 kubelet[2910]: E0913 00:05:40.006855 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.007462 kubelet[2910]: E0913 00:05:40.007413 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.007462 kubelet[2910]: W0913 00:05:40.007451 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.007785 kubelet[2910]: E0913 00:05:40.007484 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.009637 kubelet[2910]: E0913 00:05:40.009106 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.009637 kubelet[2910]: W0913 00:05:40.009161 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.009637 kubelet[2910]: E0913 00:05:40.009203 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.009928 kubelet[2910]: E0913 00:05:40.009820 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.009928 kubelet[2910]: W0913 00:05:40.009848 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.009928 kubelet[2910]: E0913 00:05:40.009881 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.011602 kubelet[2910]: E0913 00:05:40.011319 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.011602 kubelet[2910]: W0913 00:05:40.011372 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.011602 kubelet[2910]: E0913 00:05:40.011408 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.014265 kubelet[2910]: E0913 00:05:40.013974 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.014265 kubelet[2910]: W0913 00:05:40.014020 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.014265 kubelet[2910]: E0913 00:05:40.014054 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.020588 kubelet[2910]: E0913 00:05:40.018011 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.020588 kubelet[2910]: W0913 00:05:40.018064 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.020588 kubelet[2910]: E0913 00:05:40.018102 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.020588 kubelet[2910]: E0913 00:05:40.020026 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.020588 kubelet[2910]: W0913 00:05:40.020059 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.020588 kubelet[2910]: E0913 00:05:40.020096 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.021094 kubelet[2910]: E0913 00:05:40.020643 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.021094 kubelet[2910]: W0913 00:05:40.020672 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.021094 kubelet[2910]: E0913 00:05:40.020706 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.027810 kubelet[2910]: E0913 00:05:40.026311 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.027810 kubelet[2910]: W0913 00:05:40.026358 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.027810 kubelet[2910]: E0913 00:05:40.026394 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.027810 kubelet[2910]: E0913 00:05:40.026868 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.027810 kubelet[2910]: W0913 00:05:40.026896 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.027810 kubelet[2910]: E0913 00:05:40.026924 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.027810 kubelet[2910]: E0913 00:05:40.027332 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.027810 kubelet[2910]: W0913 00:05:40.027358 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.027810 kubelet[2910]: E0913 00:05:40.027386 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.028450 kubelet[2910]: E0913 00:05:40.027862 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.028450 kubelet[2910]: W0913 00:05:40.027889 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.028450 kubelet[2910]: E0913 00:05:40.027920 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.028450 kubelet[2910]: E0913 00:05:40.028310 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.028450 kubelet[2910]: W0913 00:05:40.028336 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.028450 kubelet[2910]: E0913 00:05:40.028362 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.028862 kubelet[2910]: E0913 00:05:40.028783 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.028862 kubelet[2910]: W0913 00:05:40.028807 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.028862 kubelet[2910]: E0913 00:05:40.028833 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.039105 kubelet[2910]: E0913 00:05:40.038441 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.039105 kubelet[2910]: W0913 00:05:40.038483 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.039105 kubelet[2910]: E0913 00:05:40.038547 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.039105 kubelet[2910]: I0913 00:05:40.038599 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0a1b1282-a990-45e1-9198-e7947e011e69-socket-dir\") pod \"csi-node-driver-6tbpg\" (UID: \"0a1b1282-a990-45e1-9198-e7947e011e69\") " pod="calico-system/csi-node-driver-6tbpg" Sep 13 00:05:40.040087 kubelet[2910]: E0913 00:05:40.039616 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.040087 kubelet[2910]: W0913 00:05:40.039659 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.040087 kubelet[2910]: E0913 00:05:40.039694 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.040087 kubelet[2910]: I0913 00:05:40.039758 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0a1b1282-a990-45e1-9198-e7947e011e69-varrun\") pod \"csi-node-driver-6tbpg\" (UID: \"0a1b1282-a990-45e1-9198-e7947e011e69\") " pod="calico-system/csi-node-driver-6tbpg" Sep 13 00:05:40.041038 kubelet[2910]: E0913 00:05:40.040986 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.041339 kubelet[2910]: W0913 00:05:40.041255 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.041960 kubelet[2910]: E0913 00:05:40.041623 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.041960 kubelet[2910]: I0913 00:05:40.041716 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ll7ng\" (UniqueName: \"kubernetes.io/projected/0a1b1282-a990-45e1-9198-e7947e011e69-kube-api-access-ll7ng\") pod \"csi-node-driver-6tbpg\" (UID: \"0a1b1282-a990-45e1-9198-e7947e011e69\") " pod="calico-system/csi-node-driver-6tbpg" Sep 13 00:05:40.042757 kubelet[2910]: E0913 00:05:40.042696 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.043063 kubelet[2910]: W0913 00:05:40.042989 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.043373 kubelet[2910]: E0913 00:05:40.043309 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.044204 kubelet[2910]: E0913 00:05:40.044163 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.044435 kubelet[2910]: W0913 00:05:40.044397 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.044773 kubelet[2910]: E0913 00:05:40.044719 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.045204 kubelet[2910]: I0913 00:05:40.045149 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0a1b1282-a990-45e1-9198-e7947e011e69-kubelet-dir\") pod \"csi-node-driver-6tbpg\" (UID: \"0a1b1282-a990-45e1-9198-e7947e011e69\") " pod="calico-system/csi-node-driver-6tbpg" Sep 13 00:05:40.051365 kubelet[2910]: E0913 00:05:40.051316 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.051656 kubelet[2910]: W0913 00:05:40.051606 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.051841 kubelet[2910]: E0913 00:05:40.051808 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.056568 kubelet[2910]: E0913 00:05:40.056503 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.056910 kubelet[2910]: W0913 00:05:40.056852 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.057624 kubelet[2910]: E0913 00:05:40.057570 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.059464 kubelet[2910]: E0913 00:05:40.059414 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.059797 kubelet[2910]: W0913 00:05:40.059735 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.060039 kubelet[2910]: E0913 00:05:40.059979 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.060596 kubelet[2910]: I0913 00:05:40.060537 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0a1b1282-a990-45e1-9198-e7947e011e69-registration-dir\") pod \"csi-node-driver-6tbpg\" (UID: \"0a1b1282-a990-45e1-9198-e7947e011e69\") " pod="calico-system/csi-node-driver-6tbpg" Sep 13 00:05:40.062005 kubelet[2910]: E0913 00:05:40.061958 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.062230 kubelet[2910]: W0913 00:05:40.062193 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.062415 kubelet[2910]: E0913 00:05:40.062384 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.063210 kubelet[2910]: E0913 00:05:40.063173 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.063317 systemd[1]: run-containerd-runc-k8s.io-febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4-runc.vMh4HB.mount: Deactivated successfully. Sep 13 00:05:40.063671 kubelet[2910]: W0913 00:05:40.063617 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.063844 kubelet[2910]: E0913 00:05:40.063815 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.064738 kubelet[2910]: E0913 00:05:40.064702 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.064953 kubelet[2910]: W0913 00:05:40.064917 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.065145 kubelet[2910]: E0913 00:05:40.065112 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.065967 kubelet[2910]: E0913 00:05:40.065929 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.066744 kubelet[2910]: W0913 00:05:40.066488 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.067043 kubelet[2910]: E0913 00:05:40.066985 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.075492 systemd[1]: Started cri-containerd-febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4.scope. Sep 13 00:05:40.077240 kubelet[2910]: E0913 00:05:40.077186 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.077499 kubelet[2910]: W0913 00:05:40.077459 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.077759 kubelet[2910]: E0913 00:05:40.077724 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.078454 kubelet[2910]: E0913 00:05:40.078407 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.078752 kubelet[2910]: W0913 00:05:40.078713 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.078921 kubelet[2910]: E0913 00:05:40.078886 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.079665 kubelet[2910]: E0913 00:05:40.079621 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.079895 kubelet[2910]: W0913 00:05:40.079855 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.080160 kubelet[2910]: E0913 00:05:40.080120 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.145000 audit[3498]: NETFILTER_CFG table=filter:97 family=2 entries=21 op=nft_register_rule pid=3498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:40.145000 audit[3498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffe5c536c0 a2=0 a3=1 items=0 ppid=3059 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:40.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:40.169000 audit[3498]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3498 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:40.181631 kubelet[2910]: E0913 00:05:40.181567 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.181631 kubelet[2910]: W0913 00:05:40.181617 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.181921 kubelet[2910]: E0913 00:05:40.181657 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.182286 kubelet[2910]: E0913 00:05:40.182190 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.182286 kubelet[2910]: W0913 00:05:40.182241 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.182286 kubelet[2910]: E0913 00:05:40.182281 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.182947 kubelet[2910]: E0913 00:05:40.182862 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.182947 kubelet[2910]: W0913 00:05:40.182909 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.182947 kubelet[2910]: E0913 00:05:40.182945 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.183606 kubelet[2910]: E0913 00:05:40.183524 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.183606 kubelet[2910]: W0913 00:05:40.183586 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.183881 kubelet[2910]: E0913 00:05:40.183622 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.184272 kubelet[2910]: E0913 00:05:40.184109 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.184272 kubelet[2910]: W0913 00:05:40.184158 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.184272 kubelet[2910]: E0913 00:05:40.184192 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.186320 kubelet[2910]: E0913 00:05:40.186218 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.186320 kubelet[2910]: W0913 00:05:40.186266 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.186320 kubelet[2910]: E0913 00:05:40.186304 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.186984 kubelet[2910]: E0913 00:05:40.186926 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.186984 kubelet[2910]: W0913 00:05:40.186983 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.187283 kubelet[2910]: E0913 00:05:40.187026 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.187627 kubelet[2910]: E0913 00:05:40.187497 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.187627 kubelet[2910]: W0913 00:05:40.187583 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.187627 kubelet[2910]: E0913 00:05:40.187617 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.188228 kubelet[2910]: E0913 00:05:40.188110 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.188228 kubelet[2910]: W0913 00:05:40.188156 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.188228 kubelet[2910]: E0913 00:05:40.188190 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.191129 kubelet[2910]: E0913 00:05:40.190897 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.191129 kubelet[2910]: W0913 00:05:40.190944 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.191129 kubelet[2910]: E0913 00:05:40.190980 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.191572 kubelet[2910]: E0913 00:05:40.191493 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.191752 kubelet[2910]: W0913 00:05:40.191569 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.191752 kubelet[2910]: E0913 00:05:40.191616 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.192224 kubelet[2910]: E0913 00:05:40.192165 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.192224 kubelet[2910]: W0913 00:05:40.192209 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.192448 kubelet[2910]: E0913 00:05:40.192244 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.197405 kubelet[2910]: E0913 00:05:40.192946 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.197405 kubelet[2910]: W0913 00:05:40.192985 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.197405 kubelet[2910]: E0913 00:05:40.193020 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.197405 kubelet[2910]: E0913 00:05:40.195759 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.197405 kubelet[2910]: W0913 00:05:40.195796 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.197405 kubelet[2910]: E0913 00:05:40.195832 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.197405 kubelet[2910]: E0913 00:05:40.196355 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.197405 kubelet[2910]: W0913 00:05:40.196387 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.197405 kubelet[2910]: E0913 00:05:40.196421 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.197405 kubelet[2910]: E0913 00:05:40.196926 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.198194 kubelet[2910]: W0913 00:05:40.196959 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.198194 kubelet[2910]: E0913 00:05:40.196991 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.198194 kubelet[2910]: E0913 00:05:40.197420 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.198194 kubelet[2910]: W0913 00:05:40.197446 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.198194 kubelet[2910]: E0913 00:05:40.197474 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.198194 kubelet[2910]: E0913 00:05:40.197936 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.198194 kubelet[2910]: W0913 00:05:40.197967 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.198194 kubelet[2910]: E0913 00:05:40.197998 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.198793 kubelet[2910]: E0913 00:05:40.198423 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.198793 kubelet[2910]: W0913 00:05:40.198449 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.198793 kubelet[2910]: E0913 00:05:40.198477 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.201612 kubelet[2910]: E0913 00:05:40.199947 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.201612 kubelet[2910]: W0913 00:05:40.199994 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.201612 kubelet[2910]: E0913 00:05:40.200032 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.202199 kubelet[2910]: E0913 00:05:40.202143 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.202199 kubelet[2910]: W0913 00:05:40.202187 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.202433 kubelet[2910]: E0913 00:05:40.202224 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.203767 kubelet[2910]: E0913 00:05:40.203709 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.203767 kubelet[2910]: W0913 00:05:40.203758 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.204022 kubelet[2910]: E0913 00:05:40.203800 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.204749 kubelet[2910]: E0913 00:05:40.204693 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.204749 kubelet[2910]: W0913 00:05:40.204736 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.205007 kubelet[2910]: E0913 00:05:40.204771 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.205786 kubelet[2910]: E0913 00:05:40.205730 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.205786 kubelet[2910]: W0913 00:05:40.205774 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.206218 kubelet[2910]: E0913 00:05:40.205810 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.207016 kubelet[2910]: E0913 00:05:40.206958 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.207016 kubelet[2910]: W0913 00:05:40.207004 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.207016 kubelet[2910]: E0913 00:05:40.207042 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.169000 audit[3498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe5c536c0 a2=0 a3=1 items=0 ppid=3059 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:40.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:40.250722 kubelet[2910]: E0913 00:05:40.250672 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:40.250977 kubelet[2910]: W0913 00:05:40.250935 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:40.251274 kubelet[2910]: E0913 00:05:40.251228 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:40.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.303000 audit: BPF prog-id=132 op=LOAD Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3442 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:40.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665626534323362366262396133356537303038666265303936366639 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3442 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:40.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665626534323362366262396133356537303038666265303936366639 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit: BPF prog-id=133 op=LOAD Sep 13 00:05:40.304000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3442 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:40.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665626534323362366262396133356537303038666265303936366639 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.304000 audit: BPF prog-id=134 op=LOAD Sep 13 00:05:40.304000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3442 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:40.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665626534323362366262396133356537303038666265303936366639 Sep 13 00:05:40.304000 audit: BPF prog-id=134 op=UNLOAD Sep 13 00:05:40.304000 audit: BPF prog-id=133 op=UNLOAD Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:40.305000 audit: BPF prog-id=135 op=LOAD Sep 13 00:05:40.305000 audit[3453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3442 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:40.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665626534323362366262396133356537303038666265303936366639 Sep 13 00:05:40.345299 env[1800]: time="2025-09-13T00:05:40.345098218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-p2t5k,Uid:440227af-e0a3-47c1-aa93-7e9ffbcf6778,Namespace:calico-system,Attempt:0,} returns sandbox id \"febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4\"" Sep 13 00:05:41.104445 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2430957698.mount: Deactivated successfully. Sep 13 00:05:41.402791 kubelet[2910]: E0913 00:05:41.402266 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tbpg" podUID="0a1b1282-a990-45e1-9198-e7947e011e69" Sep 13 00:05:42.403590 env[1800]: time="2025-09-13T00:05:42.403482020Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:42.407665 env[1800]: time="2025-09-13T00:05:42.407595606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6a1496fdc48cc0b9ab3c10aef777497484efac5df9efbfbbdf9775e9583645cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:42.412113 env[1800]: time="2025-09-13T00:05:42.412045313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:42.416022 env[1800]: time="2025-09-13T00:05:42.415960647Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f4a3d61ffda9c98a53adeb412c5af404ca3727a3cc2d0b4ef28d197bdd47ecaa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:42.417973 env[1800]: time="2025-09-13T00:05:42.417870944Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.3\" returns image reference \"sha256:6a1496fdc48cc0b9ab3c10aef777497484efac5df9efbfbbdf9775e9583645cb\"" Sep 13 00:05:42.421898 env[1800]: time="2025-09-13T00:05:42.421592225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:05:42.461193 env[1800]: time="2025-09-13T00:05:42.461098712Z" level=info msg="CreateContainer within sandbox \"091f059cfba8c12bf0a06ccf2d6de4b34cb49560b58492dc54ed47decbe9217d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Sep 13 00:05:42.491966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4072172938.mount: Deactivated successfully. Sep 13 00:05:42.499712 env[1800]: time="2025-09-13T00:05:42.499633892Z" level=info msg="CreateContainer within sandbox \"091f059cfba8c12bf0a06ccf2d6de4b34cb49560b58492dc54ed47decbe9217d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"232e9769567a38248d2b5e0927f64c88bbfccd3238285cd7abbb83f772e395f6\"" Sep 13 00:05:42.503034 env[1800]: time="2025-09-13T00:05:42.500591290Z" level=info msg="StartContainer for \"232e9769567a38248d2b5e0927f64c88bbfccd3238285cd7abbb83f772e395f6\"" Sep 13 00:05:42.552892 systemd[1]: Started cri-containerd-232e9769567a38248d2b5e0927f64c88bbfccd3238285cd7abbb83f772e395f6.scope. Sep 13 00:05:42.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.615000 audit: BPF prog-id=136 op=LOAD Sep 13 00:05:42.617000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.617000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3379 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:42.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326539373639353637613338323438643262356530393237663634 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3379 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:42.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326539373639353637613338323438643262356530393237663634 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.618000 audit: BPF prog-id=137 op=LOAD Sep 13 00:05:42.618000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3379 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:42.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326539373639353637613338323438643262356530393237663634 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.620000 audit: BPF prog-id=138 op=LOAD Sep 13 00:05:42.620000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3379 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:42.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326539373639353637613338323438643262356530393237663634 Sep 13 00:05:42.622000 audit: BPF prog-id=138 op=UNLOAD Sep 13 00:05:42.623000 audit: BPF prog-id=137 op=UNLOAD Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { perfmon } for pid=3553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit[3553]: AVC avc: denied { bpf } for pid=3553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:42.623000 audit: BPF prog-id=139 op=LOAD Sep 13 00:05:42.623000 audit[3553]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3379 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:42.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326539373639353637613338323438643262356530393237663634 Sep 13 00:05:42.674428 env[1800]: time="2025-09-13T00:05:42.674244347Z" level=info msg="StartContainer for \"232e9769567a38248d2b5e0927f64c88bbfccd3238285cd7abbb83f772e395f6\" returns successfully" Sep 13 00:05:43.402600 kubelet[2910]: E0913 00:05:43.402488 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tbpg" podUID="0a1b1282-a990-45e1-9198-e7947e011e69" Sep 13 00:05:43.650917 env[1800]: time="2025-09-13T00:05:43.650835015Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:43.656874 env[1800]: time="2025-09-13T00:05:43.656305887Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:43.657054 kubelet[2910]: E0913 00:05:43.656535 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.657054 kubelet[2910]: W0913 00:05:43.656564 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.657054 kubelet[2910]: E0913 00:05:43.656596 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.657374 kubelet[2910]: E0913 00:05:43.657188 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.657374 kubelet[2910]: W0913 00:05:43.657214 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.657374 kubelet[2910]: E0913 00:05:43.657243 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.657803 kubelet[2910]: E0913 00:05:43.657759 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.657803 kubelet[2910]: W0913 00:05:43.657796 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.658016 kubelet[2910]: E0913 00:05:43.657824 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.658308 kubelet[2910]: E0913 00:05:43.658266 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.658308 kubelet[2910]: W0913 00:05:43.658299 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.658465 kubelet[2910]: E0913 00:05:43.658323 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.658935 kubelet[2910]: E0913 00:05:43.658833 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.658935 kubelet[2910]: W0913 00:05:43.658893 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.658935 kubelet[2910]: E0913 00:05:43.658921 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.659500 kubelet[2910]: E0913 00:05:43.659438 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.659500 kubelet[2910]: W0913 00:05:43.659499 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.659825 kubelet[2910]: E0913 00:05:43.659585 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.663797 kubelet[2910]: E0913 00:05:43.663460 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.663797 kubelet[2910]: W0913 00:05:43.663503 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.663797 kubelet[2910]: E0913 00:05:43.663677 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.664345 kubelet[2910]: E0913 00:05:43.664300 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.664557 kubelet[2910]: W0913 00:05:43.664362 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.664557 kubelet[2910]: E0913 00:05:43.664391 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.664974 kubelet[2910]: E0913 00:05:43.664931 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.665081 kubelet[2910]: W0913 00:05:43.664993 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.665081 kubelet[2910]: E0913 00:05:43.665023 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.665647 kubelet[2910]: E0913 00:05:43.665591 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.665923 kubelet[2910]: W0913 00:05:43.665650 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.665923 kubelet[2910]: E0913 00:05:43.665681 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.666307 kubelet[2910]: E0913 00:05:43.666275 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.666307 kubelet[2910]: W0913 00:05:43.666299 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.666583 kubelet[2910]: E0913 00:05:43.666324 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.666748 kubelet[2910]: E0913 00:05:43.666707 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.666748 kubelet[2910]: W0913 00:05:43.666736 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.671667 kubelet[2910]: E0913 00:05:43.666759 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.671667 kubelet[2910]: E0913 00:05:43.667220 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.671667 kubelet[2910]: W0913 00:05:43.667262 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.671667 kubelet[2910]: E0913 00:05:43.667309 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.671667 kubelet[2910]: I0913 00:05:43.669957 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-697b8c5bdb-h4t44" podStartSLOduration=3.06320664 podStartE2EDuration="5.669933683s" podCreationTimestamp="2025-09-13 00:05:38 +0000 UTC" firstStartedPulling="2025-09-13 00:05:39.813724735 +0000 UTC m=+37.744962252" lastFinishedPulling="2025-09-13 00:05:42.420451778 +0000 UTC m=+40.351689295" observedRunningTime="2025-09-13 00:05:43.639194735 +0000 UTC m=+41.570432264" watchObservedRunningTime="2025-09-13 00:05:43.669933683 +0000 UTC m=+41.601171200" Sep 13 00:05:43.675366 env[1800]: time="2025-09-13T00:05:43.675292836Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:43.675599 kubelet[2910]: E0913 00:05:43.675477 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.675689 kubelet[2910]: W0913 00:05:43.675616 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.675689 kubelet[2910]: E0913 00:05:43.675655 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.676097 kubelet[2910]: E0913 00:05:43.676058 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.676097 kubelet[2910]: W0913 00:05:43.676089 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.676432 kubelet[2910]: E0913 00:05:43.676115 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.680920 env[1800]: time="2025-09-13T00:05:43.680854069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:43.683962 env[1800]: time="2025-09-13T00:05:43.682606589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 13 00:05:43.689958 env[1800]: time="2025-09-13T00:05:43.689891386Z" level=info msg="CreateContainer within sandbox \"febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:05:43.719087 env[1800]: time="2025-09-13T00:05:43.719024934Z" level=info msg="CreateContainer within sandbox \"febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548\"" Sep 13 00:05:43.720601 env[1800]: time="2025-09-13T00:05:43.720237405Z" level=info msg="StartContainer for \"c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548\"" Sep 13 00:05:43.721567 kubelet[2910]: E0913 00:05:43.721333 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.721567 kubelet[2910]: W0913 00:05:43.721371 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.721567 kubelet[2910]: E0913 00:05:43.721406 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.728126 kubelet[2910]: E0913 00:05:43.727746 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.728126 kubelet[2910]: W0913 00:05:43.727787 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.728126 kubelet[2910]: E0913 00:05:43.727822 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.730300 kubelet[2910]: E0913 00:05:43.729970 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.730300 kubelet[2910]: W0913 00:05:43.730006 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.730300 kubelet[2910]: E0913 00:05:43.730057 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.731063 kubelet[2910]: E0913 00:05:43.730746 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.731063 kubelet[2910]: W0913 00:05:43.730777 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.731063 kubelet[2910]: E0913 00:05:43.730808 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.731788 kubelet[2910]: E0913 00:05:43.731741 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.734570 kubelet[2910]: W0913 00:05:43.732144 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.734570 kubelet[2910]: E0913 00:05:43.732236 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.737789 kubelet[2910]: E0913 00:05:43.737724 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.737789 kubelet[2910]: W0913 00:05:43.737769 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.738061 kubelet[2910]: E0913 00:05:43.737807 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.738314 kubelet[2910]: E0913 00:05:43.738216 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.738314 kubelet[2910]: W0913 00:05:43.738246 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.738314 kubelet[2910]: E0913 00:05:43.738271 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.738718 kubelet[2910]: E0913 00:05:43.738676 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.738718 kubelet[2910]: W0913 00:05:43.738705 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.738892 kubelet[2910]: E0913 00:05:43.738731 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.740997 kubelet[2910]: E0913 00:05:43.740715 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.740997 kubelet[2910]: W0913 00:05:43.740754 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.740997 kubelet[2910]: E0913 00:05:43.740792 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.741462 kubelet[2910]: E0913 00:05:43.741432 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.741881 kubelet[2910]: W0913 00:05:43.741641 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.741881 kubelet[2910]: E0913 00:05:43.741690 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.743318 kubelet[2910]: E0913 00:05:43.743278 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.743646 kubelet[2910]: W0913 00:05:43.743612 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.743809 kubelet[2910]: E0913 00:05:43.743782 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.745219 kubelet[2910]: E0913 00:05:43.745161 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.745628 kubelet[2910]: W0913 00:05:43.745488 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.745850 kubelet[2910]: E0913 00:05:43.745821 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.746698 kubelet[2910]: E0913 00:05:43.746662 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.746915 kubelet[2910]: W0913 00:05:43.746886 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.747052 kubelet[2910]: E0913 00:05:43.747026 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.759481 kubelet[2910]: E0913 00:05:43.759444 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.759991 kubelet[2910]: W0913 00:05:43.759959 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.760127 kubelet[2910]: E0913 00:05:43.760101 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.761222 kubelet[2910]: E0913 00:05:43.761184 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.761453 kubelet[2910]: W0913 00:05:43.761424 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.761658 kubelet[2910]: E0913 00:05:43.761631 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.762194 kubelet[2910]: E0913 00:05:43.762166 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.762356 kubelet[2910]: W0913 00:05:43.762330 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.762476 kubelet[2910]: E0913 00:05:43.762451 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.767005 kubelet[2910]: E0913 00:05:43.766728 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.767005 kubelet[2910]: W0913 00:05:43.766765 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.767005 kubelet[2910]: E0913 00:05:43.766798 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.769928 kubelet[2910]: E0913 00:05:43.769806 2910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:05:43.769928 kubelet[2910]: W0913 00:05:43.769842 2910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:05:43.769928 kubelet[2910]: E0913 00:05:43.769875 2910 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:05:43.798276 systemd[1]: Started cri-containerd-c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548.scope. Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3442 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:43.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373065613562366564313332373839623161316261363031616634 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit: BPF prog-id=140 op=LOAD Sep 13 00:05:43.865000 audit[3623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3442 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:43.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373065613562366564313332373839623161316261363031616634 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit: BPF prog-id=141 op=LOAD Sep 13 00:05:43.865000 audit[3623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3442 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:43.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373065613562366564313332373839623161316261363031616634 Sep 13 00:05:43.865000 audit: BPF prog-id=141 op=UNLOAD Sep 13 00:05:43.865000 audit: BPF prog-id=140 op=UNLOAD Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { perfmon } for pid=3623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit[3623]: AVC avc: denied { bpf } for pid=3623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:43.865000 audit: BPF prog-id=142 op=LOAD Sep 13 00:05:43.865000 audit[3623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3442 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:43.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373065613562366564313332373839623161316261363031616634 Sep 13 00:05:43.891658 kernel: kauditd_printk_skb: 222 callbacks suppressed Sep 13 00:05:43.891843 kernel: audit: type=1325 audit(1757721943.883:1031): table=filter:99 family=2 entries=21 op=nft_register_rule pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:43.883000 audit[3641]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:43.883000 audit[3641]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffc29cda40 a2=0 a3=1 items=0 ppid=3059 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:43.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:43.911809 kernel: audit: type=1300 audit(1757721943.883:1031): arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffc29cda40 a2=0 a3=1 items=0 ppid=3059 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:43.911956 kernel: audit: type=1327 audit(1757721943.883:1031): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:43.929000 audit[3641]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:43.936533 kernel: audit: type=1325 audit(1757721943.929:1032): table=nat:100 family=2 entries=19 op=nft_register_chain pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:05:43.929000 audit[3641]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffc29cda40 a2=0 a3=1 items=0 ppid=3059 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:43.965489 kernel: audit: type=1300 audit(1757721943.929:1032): arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffc29cda40 a2=0 a3=1 items=0 ppid=3059 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:43.965686 kernel: audit: type=1327 audit(1757721943.929:1032): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:43.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:05:43.966249 env[1800]: time="2025-09-13T00:05:43.966080564Z" level=info msg="StartContainer for \"c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548\" returns successfully" Sep 13 00:05:44.043500 systemd[1]: cri-containerd-c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548.scope: Deactivated successfully. Sep 13 00:05:44.049000 audit: BPF prog-id=142 op=UNLOAD Sep 13 00:05:44.053551 kernel: audit: type=1334 audit(1757721944.049:1033): prog-id=142 op=UNLOAD Sep 13 00:05:44.300870 env[1800]: time="2025-09-13T00:05:44.300805883Z" level=info msg="shim disconnected" id=c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548 Sep 13 00:05:44.301277 env[1800]: time="2025-09-13T00:05:44.301227960Z" level=warning msg="cleaning up after shim disconnected" id=c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548 namespace=k8s.io Sep 13 00:05:44.301410 env[1800]: time="2025-09-13T00:05:44.301382400Z" level=info msg="cleaning up dead shim" Sep 13 00:05:44.316578 env[1800]: time="2025-09-13T00:05:44.316519438Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:05:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3664 runtime=io.containerd.runc.v2\n" Sep 13 00:05:44.433371 systemd[1]: run-containerd-runc-k8s.io-c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548-runc.gIBvQW.mount: Deactivated successfully. Sep 13 00:05:44.433568 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c470ea5b6ed132789b1a1ba601af4ff109a33f3e97ba6ce913764e1fa7486548-rootfs.mount: Deactivated successfully. Sep 13 00:05:44.620839 env[1800]: time="2025-09-13T00:05:44.620661929Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:05:45.403118 kubelet[2910]: E0913 00:05:45.402573 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tbpg" podUID="0a1b1282-a990-45e1-9198-e7947e011e69" Sep 13 00:05:47.402175 kubelet[2910]: E0913 00:05:47.402091 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tbpg" podUID="0a1b1282-a990-45e1-9198-e7947e011e69" Sep 13 00:05:48.825200 env[1800]: time="2025-09-13T00:05:48.825115820Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:48.828810 env[1800]: time="2025-09-13T00:05:48.828057735Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:48.830663 env[1800]: time="2025-09-13T00:05:48.830584397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:48.833640 env[1800]: time="2025-09-13T00:05:48.832888215Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:05:48.834135 env[1800]: time="2025-09-13T00:05:48.834085111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 13 00:05:48.845196 env[1800]: time="2025-09-13T00:05:48.845118024Z" level=info msg="CreateContainer within sandbox \"febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:05:48.867673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1641124747.mount: Deactivated successfully. Sep 13 00:05:48.875440 env[1800]: time="2025-09-13T00:05:48.875374111Z" level=info msg="CreateContainer within sandbox \"febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b\"" Sep 13 00:05:48.877902 env[1800]: time="2025-09-13T00:05:48.877842630Z" level=info msg="StartContainer for \"d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b\"" Sep 13 00:05:48.925081 systemd[1]: run-containerd-runc-k8s.io-d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b-runc.hK2JDW.mount: Deactivated successfully. Sep 13 00:05:48.936920 systemd[1]: Started cri-containerd-d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b.scope. Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3442 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:49.000375 kernel: audit: type=1400 audit(1757721948.979:1034): avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.000571 kernel: audit: type=1300 audit(1757721948.979:1034): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3442 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:48.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343932396434323665396331613839343966356162353965383139 Sep 13 00:05:49.012676 kernel: audit: type=1327 audit(1757721948.979:1034): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343932396434323665396331613839343966356162353965383139 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.022880 kernel: audit: type=1400 audit(1757721948.979:1035): avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.037931 kernel: audit: type=1400 audit(1757721948.979:1035): avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.049283 kernel: audit: type=1400 audit(1757721948.979:1035): avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.059602 kernel: audit: type=1400 audit(1757721948.979:1035): avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.068158 kernel: audit: type=1400 audit(1757721948.979:1035): avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.076199 kernel: audit: type=1400 audit(1757721948.979:1035): avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.084321 kernel: audit: type=1400 audit(1757721948.979:1035): avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:49.085969 env[1800]: time="2025-09-13T00:05:49.085908722Z" level=info msg="StartContainer for \"d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b\" returns successfully" Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.979000 audit: BPF prog-id=143 op=LOAD Sep 13 00:05:48.979000 audit[3688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3442 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:48.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343932396434323665396331613839343966356162353965383139 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit: BPF prog-id=144 op=LOAD Sep 13 00:05:48.987000 audit[3688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3442 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:48.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343932396434323665396331613839343966356162353965383139 Sep 13 00:05:48.987000 audit: BPF prog-id=144 op=UNLOAD Sep 13 00:05:48.987000 audit: BPF prog-id=143 op=UNLOAD Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:05:48.987000 audit: BPF prog-id=145 op=LOAD Sep 13 00:05:48.987000 audit[3688]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3442 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:05:48.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438343932396434323665396331613839343966356162353965383139 Sep 13 00:05:49.401876 kubelet[2910]: E0913 00:05:49.401732 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tbpg" podUID="0a1b1282-a990-45e1-9198-e7947e011e69" Sep 13 00:05:50.407187 env[1800]: time="2025-09-13T00:05:50.407074437Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:05:50.413778 systemd[1]: cri-containerd-d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b.scope: Deactivated successfully. Sep 13 00:05:50.414235 systemd[1]: cri-containerd-d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b.scope: Consumed 1.165s CPU time. Sep 13 00:05:50.417000 audit: BPF prog-id=145 op=UNLOAD Sep 13 00:05:50.464255 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b-rootfs.mount: Deactivated successfully. Sep 13 00:05:50.504643 kubelet[2910]: I0913 00:05:50.504581 2910 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 00:05:50.588214 systemd[1]: Created slice kubepods-burstable-podcb741d37_7d49_431e_9106_0f883bed0386.slice. Sep 13 00:05:50.685272 systemd[1]: Created slice kubepods-burstable-pod826cb41c_6196_44e2_8067_26a5b78bea02.slice. Sep 13 00:05:50.714640 kubelet[2910]: I0913 00:05:50.714553 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jl2zr\" (UniqueName: \"kubernetes.io/projected/cb741d37-7d49-431e-9106-0f883bed0386-kube-api-access-jl2zr\") pod \"coredns-674b8bbfcf-kfggq\" (UID: \"cb741d37-7d49-431e-9106-0f883bed0386\") " pod="kube-system/coredns-674b8bbfcf-kfggq" Sep 13 00:05:50.734747 kubelet[2910]: I0913 00:05:50.714649 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cb741d37-7d49-431e-9106-0f883bed0386-config-volume\") pod \"coredns-674b8bbfcf-kfggq\" (UID: \"cb741d37-7d49-431e-9106-0f883bed0386\") " pod="kube-system/coredns-674b8bbfcf-kfggq" Sep 13 00:05:50.751282 systemd[1]: Created slice kubepods-besteffort-pode649b2a4_e3e6_4707_952b_39cddc6671e5.slice. Sep 13 00:05:50.784874 env[1800]: time="2025-09-13T00:05:50.784729730Z" level=info msg="shim disconnected" id=d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b Sep 13 00:05:50.785077 env[1800]: time="2025-09-13T00:05:50.784867845Z" level=warning msg="cleaning up after shim disconnected" id=d84929d426e9c1a8949f5ab59e819e07e3d130ceb2bac1307e1a6a71cd0d687b namespace=k8s.io Sep 13 00:05:50.785077 env[1800]: time="2025-09-13T00:05:50.784915010Z" level=info msg="cleaning up dead shim" Sep 13 00:05:50.803236 systemd[1]: Created slice kubepods-besteffort-podb1e8d677_ddcc_4797_9a2b_15289c5f278d.slice. Sep 13 00:05:50.805825 env[1800]: time="2025-09-13T00:05:50.804273826Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:05:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3726 runtime=io.containerd.runc.v2\n" Sep 13 00:05:50.816564 kubelet[2910]: I0913 00:05:50.815607 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/826cb41c-6196-44e2-8067-26a5b78bea02-config-volume\") pod \"coredns-674b8bbfcf-xhbkk\" (UID: \"826cb41c-6196-44e2-8067-26a5b78bea02\") " pod="kube-system/coredns-674b8bbfcf-xhbkk" Sep 13 00:05:50.816564 kubelet[2910]: I0913 00:05:50.816092 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rghhq\" (UniqueName: \"kubernetes.io/projected/826cb41c-6196-44e2-8067-26a5b78bea02-kube-api-access-rghhq\") pod \"coredns-674b8bbfcf-xhbkk\" (UID: \"826cb41c-6196-44e2-8067-26a5b78bea02\") " pod="kube-system/coredns-674b8bbfcf-xhbkk" Sep 13 00:05:50.816564 kubelet[2910]: I0913 00:05:50.816298 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2mwgz\" (UniqueName: \"kubernetes.io/projected/e649b2a4-e3e6-4707-952b-39cddc6671e5-kube-api-access-2mwgz\") pod \"calico-kube-controllers-68d596d8c-6g75b\" (UID: \"e649b2a4-e3e6-4707-952b-39cddc6671e5\") " pod="calico-system/calico-kube-controllers-68d596d8c-6g75b" Sep 13 00:05:50.822005 kubelet[2910]: I0913 00:05:50.820332 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e649b2a4-e3e6-4707-952b-39cddc6671e5-tigera-ca-bundle\") pod \"calico-kube-controllers-68d596d8c-6g75b\" (UID: \"e649b2a4-e3e6-4707-952b-39cddc6671e5\") " pod="calico-system/calico-kube-controllers-68d596d8c-6g75b" Sep 13 00:05:50.832585 systemd[1]: Created slice kubepods-besteffort-pod5ac35ace_3aab_4949_a692_f16bda148488.slice. Sep 13 00:05:50.855310 systemd[1]: Created slice kubepods-besteffort-poda8be4b28_8b5c_4ca5_b13d_63f217abdcee.slice. Sep 13 00:05:50.871378 systemd[1]: Created slice kubepods-besteffort-pod87c5762d_a899_497f_9d70_e924d2675a2b.slice. Sep 13 00:05:50.885257 systemd[1]: Created slice kubepods-besteffort-pod86eab1aa_9333_4320_8fc8_683957d99836.slice. Sep 13 00:05:50.922814 kubelet[2910]: I0913 00:05:50.922740 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dtstx\" (UniqueName: \"kubernetes.io/projected/b1e8d677-ddcc-4797-9a2b-15289c5f278d-kube-api-access-dtstx\") pod \"calico-apiserver-6764956d8d-gcsgl\" (UID: \"b1e8d677-ddcc-4797-9a2b-15289c5f278d\") " pod="calico-apiserver/calico-apiserver-6764956d8d-gcsgl" Sep 13 00:05:50.923441 kubelet[2910]: I0913 00:05:50.923384 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b1e8d677-ddcc-4797-9a2b-15289c5f278d-calico-apiserver-certs\") pod \"calico-apiserver-6764956d8d-gcsgl\" (UID: \"b1e8d677-ddcc-4797-9a2b-15289c5f278d\") " pod="calico-apiserver/calico-apiserver-6764956d8d-gcsgl" Sep 13 00:05:50.923615 kubelet[2910]: I0913 00:05:50.923485 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/87c5762d-a899-497f-9d70-e924d2675a2b-whisker-backend-key-pair\") pod \"whisker-6d6b67b765-5gpr5\" (UID: \"87c5762d-a899-497f-9d70-e924d2675a2b\") " pod="calico-system/whisker-6d6b67b765-5gpr5" Sep 13 00:05:50.923702 kubelet[2910]: I0913 00:05:50.923667 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87c5762d-a899-497f-9d70-e924d2675a2b-whisker-ca-bundle\") pod \"whisker-6d6b67b765-5gpr5\" (UID: \"87c5762d-a899-497f-9d70-e924d2675a2b\") " pod="calico-system/whisker-6d6b67b765-5gpr5" Sep 13 00:05:50.923776 kubelet[2910]: I0913 00:05:50.923757 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7jdmf\" (UniqueName: \"kubernetes.io/projected/87c5762d-a899-497f-9d70-e924d2675a2b-kube-api-access-7jdmf\") pod \"whisker-6d6b67b765-5gpr5\" (UID: \"87c5762d-a899-497f-9d70-e924d2675a2b\") " pod="calico-system/whisker-6d6b67b765-5gpr5" Sep 13 00:05:50.923888 kubelet[2910]: I0913 00:05:50.923857 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5ac35ace-3aab-4949-a692-f16bda148488-goldmane-ca-bundle\") pod \"goldmane-54d579b49d-rdxkn\" (UID: \"5ac35ace-3aab-4949-a692-f16bda148488\") " pod="calico-system/goldmane-54d579b49d-rdxkn" Sep 13 00:05:50.926952 kubelet[2910]: I0913 00:05:50.924028 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/86eab1aa-9333-4320-8fc8-683957d99836-calico-apiserver-certs\") pod \"calico-apiserver-f8688475b-snkh7\" (UID: \"86eab1aa-9333-4320-8fc8-683957d99836\") " pod="calico-apiserver/calico-apiserver-f8688475b-snkh7" Sep 13 00:05:50.927597 kubelet[2910]: I0913 00:05:50.927539 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/5ac35ace-3aab-4949-a692-f16bda148488-config\") pod \"goldmane-54d579b49d-rdxkn\" (UID: \"5ac35ace-3aab-4949-a692-f16bda148488\") " pod="calico-system/goldmane-54d579b49d-rdxkn" Sep 13 00:05:50.927749 kubelet[2910]: I0913 00:05:50.927610 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/5ac35ace-3aab-4949-a692-f16bda148488-goldmane-key-pair\") pod \"goldmane-54d579b49d-rdxkn\" (UID: \"5ac35ace-3aab-4949-a692-f16bda148488\") " pod="calico-system/goldmane-54d579b49d-rdxkn" Sep 13 00:05:50.927749 kubelet[2910]: I0913 00:05:50.927653 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fz7rn\" (UniqueName: \"kubernetes.io/projected/a8be4b28-8b5c-4ca5-b13d-63f217abdcee-kube-api-access-fz7rn\") pod \"calico-apiserver-f8688475b-gfns6\" (UID: \"a8be4b28-8b5c-4ca5-b13d-63f217abdcee\") " pod="calico-apiserver/calico-apiserver-f8688475b-gfns6" Sep 13 00:05:50.927749 kubelet[2910]: I0913 00:05:50.927702 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gx2lg\" (UniqueName: \"kubernetes.io/projected/5ac35ace-3aab-4949-a692-f16bda148488-kube-api-access-gx2lg\") pod \"goldmane-54d579b49d-rdxkn\" (UID: \"5ac35ace-3aab-4949-a692-f16bda148488\") " pod="calico-system/goldmane-54d579b49d-rdxkn" Sep 13 00:05:50.927749 kubelet[2910]: I0913 00:05:50.927744 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a8be4b28-8b5c-4ca5-b13d-63f217abdcee-calico-apiserver-certs\") pod \"calico-apiserver-f8688475b-gfns6\" (UID: \"a8be4b28-8b5c-4ca5-b13d-63f217abdcee\") " pod="calico-apiserver/calico-apiserver-f8688475b-gfns6" Sep 13 00:05:50.928019 kubelet[2910]: I0913 00:05:50.927811 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mrr5p\" (UniqueName: \"kubernetes.io/projected/86eab1aa-9333-4320-8fc8-683957d99836-kube-api-access-mrr5p\") pod \"calico-apiserver-f8688475b-snkh7\" (UID: \"86eab1aa-9333-4320-8fc8-683957d99836\") " pod="calico-apiserver/calico-apiserver-f8688475b-snkh7" Sep 13 00:05:50.963657 env[1800]: time="2025-09-13T00:05:50.957371984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-kfggq,Uid:cb741d37-7d49-431e-9106-0f883bed0386,Namespace:kube-system,Attempt:0,}" Sep 13 00:05:51.081975 env[1800]: time="2025-09-13T00:05:51.081818572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d596d8c-6g75b,Uid:e649b2a4-e3e6-4707-952b-39cddc6671e5,Namespace:calico-system,Attempt:0,}" Sep 13 00:05:51.169423 env[1800]: time="2025-09-13T00:05:51.169337543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f8688475b-gfns6,Uid:a8be4b28-8b5c-4ca5-b13d-63f217abdcee,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:05:51.181865 env[1800]: time="2025-09-13T00:05:51.181786039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6d6b67b765-5gpr5,Uid:87c5762d-a899-497f-9d70-e924d2675a2b,Namespace:calico-system,Attempt:0,}" Sep 13 00:05:51.201805 env[1800]: time="2025-09-13T00:05:51.201741680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f8688475b-snkh7,Uid:86eab1aa-9333-4320-8fc8-683957d99836,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:05:51.291995 env[1800]: time="2025-09-13T00:05:51.291914298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-xhbkk,Uid:826cb41c-6196-44e2-8067-26a5b78bea02,Namespace:kube-system,Attempt:0,}" Sep 13 00:05:51.317770 env[1800]: time="2025-09-13T00:05:51.317657015Z" level=error msg="Failed to destroy network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.318495 env[1800]: time="2025-09-13T00:05:51.318412764Z" level=error msg="encountered an error cleaning up failed sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.318654 env[1800]: time="2025-09-13T00:05:51.318538701Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-kfggq,Uid:cb741d37-7d49-431e-9106-0f883bed0386,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.318991 kubelet[2910]: E0913 00:05:51.318920 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.319096 kubelet[2910]: E0913 00:05:51.319044 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-kfggq" Sep 13 00:05:51.319166 kubelet[2910]: E0913 00:05:51.319105 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-kfggq" Sep 13 00:05:51.319284 kubelet[2910]: E0913 00:05:51.319207 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-kfggq_kube-system(cb741d37-7d49-431e-9106-0f883bed0386)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-kfggq_kube-system(cb741d37-7d49-431e-9106-0f883bed0386)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-kfggq" podUID="cb741d37-7d49-431e-9106-0f883bed0386" Sep 13 00:05:51.413923 systemd[1]: Created slice kubepods-besteffort-pod0a1b1282_a990_45e1_9198_e7947e011e69.slice. Sep 13 00:05:51.420322 env[1800]: time="2025-09-13T00:05:51.420245985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6764956d8d-gcsgl,Uid:b1e8d677-ddcc-4797-9a2b-15289c5f278d,Namespace:calico-apiserver,Attempt:0,}" Sep 13 00:05:51.421082 env[1800]: time="2025-09-13T00:05:51.421024484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tbpg,Uid:0a1b1282-a990-45e1-9198-e7947e011e69,Namespace:calico-system,Attempt:0,}" Sep 13 00:05:51.448453 env[1800]: time="2025-09-13T00:05:51.448382678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-rdxkn,Uid:5ac35ace-3aab-4949-a692-f16bda148488,Namespace:calico-system,Attempt:0,}" Sep 13 00:05:51.501321 env[1800]: time="2025-09-13T00:05:51.496153476Z" level=error msg="Failed to destroy network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.501321 env[1800]: time="2025-09-13T00:05:51.498363142Z" level=error msg="encountered an error cleaning up failed sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.501321 env[1800]: time="2025-09-13T00:05:51.498468285Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d596d8c-6g75b,Uid:e649b2a4-e3e6-4707-952b-39cddc6671e5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.503565 kubelet[2910]: E0913 00:05:51.502015 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.503565 kubelet[2910]: E0913 00:05:51.502100 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68d596d8c-6g75b" Sep 13 00:05:51.503565 kubelet[2910]: E0913 00:05:51.502138 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68d596d8c-6g75b" Sep 13 00:05:51.503894 kubelet[2910]: E0913 00:05:51.502223 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-68d596d8c-6g75b_calico-system(e649b2a4-e3e6-4707-952b-39cddc6671e5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-68d596d8c-6g75b_calico-system(e649b2a4-e3e6-4707-952b-39cddc6671e5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68d596d8c-6g75b" podUID="e649b2a4-e3e6-4707-952b-39cddc6671e5" Sep 13 00:05:51.525065 env[1800]: time="2025-09-13T00:05:51.524992788Z" level=error msg="Failed to destroy network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.525926 env[1800]: time="2025-09-13T00:05:51.525870610Z" level=error msg="encountered an error cleaning up failed sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.526177 env[1800]: time="2025-09-13T00:05:51.526113076Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f8688475b-snkh7,Uid:86eab1aa-9333-4320-8fc8-683957d99836,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.526757 kubelet[2910]: E0913 00:05:51.526670 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.529758 kubelet[2910]: E0913 00:05:51.526786 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-f8688475b-snkh7" Sep 13 00:05:51.529758 kubelet[2910]: E0913 00:05:51.526823 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-f8688475b-snkh7" Sep 13 00:05:51.529758 kubelet[2910]: E0913 00:05:51.526914 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-f8688475b-snkh7_calico-apiserver(86eab1aa-9333-4320-8fc8-683957d99836)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-f8688475b-snkh7_calico-apiserver(86eab1aa-9333-4320-8fc8-683957d99836)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-f8688475b-snkh7" podUID="86eab1aa-9333-4320-8fc8-683957d99836" Sep 13 00:05:51.555222 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b-shm.mount: Deactivated successfully. Sep 13 00:05:51.579255 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281-shm.mount: Deactivated successfully. Sep 13 00:05:51.579452 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086-shm.mount: Deactivated successfully. Sep 13 00:05:51.654107 kubelet[2910]: I0913 00:05:51.654014 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:05:51.662632 env[1800]: time="2025-09-13T00:05:51.662559836Z" level=info msg="StopPodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\"" Sep 13 00:05:51.682447 kubelet[2910]: I0913 00:05:51.679204 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:05:51.682742 env[1800]: time="2025-09-13T00:05:51.680713759Z" level=info msg="StopPodSandbox for \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\"" Sep 13 00:05:51.688949 kubelet[2910]: I0913 00:05:51.688239 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:05:51.689346 env[1800]: time="2025-09-13T00:05:51.689277863Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:05:51.705941 env[1800]: time="2025-09-13T00:05:51.705882156Z" level=info msg="StopPodSandbox for \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\"" Sep 13 00:05:51.736917 env[1800]: time="2025-09-13T00:05:51.736824636Z" level=error msg="Failed to destroy network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.747184 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681-shm.mount: Deactivated successfully. Sep 13 00:05:51.749916 env[1800]: time="2025-09-13T00:05:51.749838213Z" level=error msg="encountered an error cleaning up failed sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.750267 env[1800]: time="2025-09-13T00:05:51.750210443Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f8688475b-gfns6,Uid:a8be4b28-8b5c-4ca5-b13d-63f217abdcee,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.761984 kubelet[2910]: E0913 00:05:51.757960 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.761984 kubelet[2910]: E0913 00:05:51.758086 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-f8688475b-gfns6" Sep 13 00:05:51.761984 kubelet[2910]: E0913 00:05:51.758150 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-f8688475b-gfns6" Sep 13 00:05:51.762341 kubelet[2910]: E0913 00:05:51.758270 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-f8688475b-gfns6_calico-apiserver(a8be4b28-8b5c-4ca5-b13d-63f217abdcee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-f8688475b-gfns6_calico-apiserver(a8be4b28-8b5c-4ca5-b13d-63f217abdcee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-f8688475b-gfns6" podUID="a8be4b28-8b5c-4ca5-b13d-63f217abdcee" Sep 13 00:05:51.843535 env[1800]: time="2025-09-13T00:05:51.841749869Z" level=error msg="Failed to destroy network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.852660 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28-shm.mount: Deactivated successfully. Sep 13 00:05:51.857025 env[1800]: time="2025-09-13T00:05:51.856934237Z" level=error msg="encountered an error cleaning up failed sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.857308 env[1800]: time="2025-09-13T00:05:51.857254573Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6d6b67b765-5gpr5,Uid:87c5762d-a899-497f-9d70-e924d2675a2b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.858239 kubelet[2910]: E0913 00:05:51.857850 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.858239 kubelet[2910]: E0913 00:05:51.857964 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6d6b67b765-5gpr5" Sep 13 00:05:51.858239 kubelet[2910]: E0913 00:05:51.858037 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6d6b67b765-5gpr5" Sep 13 00:05:51.861385 kubelet[2910]: E0913 00:05:51.858151 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6d6b67b765-5gpr5_calico-system(87c5762d-a899-497f-9d70-e924d2675a2b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6d6b67b765-5gpr5_calico-system(87c5762d-a899-497f-9d70-e924d2675a2b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6d6b67b765-5gpr5" podUID="87c5762d-a899-497f-9d70-e924d2675a2b" Sep 13 00:05:51.922090 env[1800]: time="2025-09-13T00:05:51.921996026Z" level=error msg="StopPodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" failed" error="failed to destroy network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.923003 kubelet[2910]: E0913 00:05:51.922542 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:05:51.923003 kubelet[2910]: E0913 00:05:51.922673 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281"} Sep 13 00:05:51.923003 kubelet[2910]: E0913 00:05:51.922824 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"86eab1aa-9333-4320-8fc8-683957d99836\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:51.923003 kubelet[2910]: E0913 00:05:51.922892 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"86eab1aa-9333-4320-8fc8-683957d99836\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-f8688475b-snkh7" podUID="86eab1aa-9333-4320-8fc8-683957d99836" Sep 13 00:05:51.970287 env[1800]: time="2025-09-13T00:05:51.970184024Z" level=error msg="StopPodSandbox for \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\" failed" error="failed to destroy network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:51.971343 kubelet[2910]: E0913 00:05:51.970801 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:05:51.971343 kubelet[2910]: E0913 00:05:51.970897 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086"} Sep 13 00:05:51.971343 kubelet[2910]: E0913 00:05:51.970985 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e649b2a4-e3e6-4707-952b-39cddc6671e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:51.971343 kubelet[2910]: E0913 00:05:51.971213 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e649b2a4-e3e6-4707-952b-39cddc6671e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68d596d8c-6g75b" podUID="e649b2a4-e3e6-4707-952b-39cddc6671e5" Sep 13 00:05:51.992062 env[1800]: time="2025-09-13T00:05:51.991953920Z" level=error msg="Failed to destroy network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.001429 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2-shm.mount: Deactivated successfully. Sep 13 00:05:52.003585 env[1800]: time="2025-09-13T00:05:52.003469664Z" level=error msg="encountered an error cleaning up failed sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.003808 env[1800]: time="2025-09-13T00:05:52.003610046Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6764956d8d-gcsgl,Uid:b1e8d677-ddcc-4797-9a2b-15289c5f278d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.004730 kubelet[2910]: E0913 00:05:52.004251 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.004730 kubelet[2910]: E0913 00:05:52.004359 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6764956d8d-gcsgl" Sep 13 00:05:52.004730 kubelet[2910]: E0913 00:05:52.004423 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6764956d8d-gcsgl" Sep 13 00:05:52.007124 kubelet[2910]: E0913 00:05:52.004636 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6764956d8d-gcsgl_calico-apiserver(b1e8d677-ddcc-4797-9a2b-15289c5f278d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6764956d8d-gcsgl_calico-apiserver(b1e8d677-ddcc-4797-9a2b-15289c5f278d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6764956d8d-gcsgl" podUID="b1e8d677-ddcc-4797-9a2b-15289c5f278d" Sep 13 00:05:52.007777 env[1800]: time="2025-09-13T00:05:52.007708290Z" level=error msg="Failed to destroy network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.010335 env[1800]: time="2025-09-13T00:05:52.010242236Z" level=error msg="encountered an error cleaning up failed sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.010779 env[1800]: time="2025-09-13T00:05:52.010699224Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-xhbkk,Uid:826cb41c-6196-44e2-8067-26a5b78bea02,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.013417 kubelet[2910]: E0913 00:05:52.011461 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.013417 kubelet[2910]: E0913 00:05:52.011582 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-xhbkk" Sep 13 00:05:52.013417 kubelet[2910]: E0913 00:05:52.011648 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-xhbkk" Sep 13 00:05:52.013864 kubelet[2910]: E0913 00:05:52.011760 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-xhbkk_kube-system(826cb41c-6196-44e2-8067-26a5b78bea02)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-xhbkk_kube-system(826cb41c-6196-44e2-8067-26a5b78bea02)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-xhbkk" podUID="826cb41c-6196-44e2-8067-26a5b78bea02" Sep 13 00:05:52.041385 env[1800]: time="2025-09-13T00:05:52.041298748Z" level=error msg="Failed to destroy network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.042199 env[1800]: time="2025-09-13T00:05:52.042138585Z" level=error msg="encountered an error cleaning up failed sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.042492 env[1800]: time="2025-09-13T00:05:52.042439065Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tbpg,Uid:0a1b1282-a990-45e1-9198-e7947e011e69,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.042980 kubelet[2910]: E0913 00:05:52.042912 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.043121 kubelet[2910]: E0913 00:05:52.043005 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6tbpg" Sep 13 00:05:52.043121 kubelet[2910]: E0913 00:05:52.043050 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6tbpg" Sep 13 00:05:52.043285 kubelet[2910]: E0913 00:05:52.043137 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6tbpg_calico-system(0a1b1282-a990-45e1-9198-e7947e011e69)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6tbpg_calico-system(0a1b1282-a990-45e1-9198-e7947e011e69)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6tbpg" podUID="0a1b1282-a990-45e1-9198-e7947e011e69" Sep 13 00:05:52.048158 env[1800]: time="2025-09-13T00:05:52.048075820Z" level=error msg="Failed to destroy network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.048902 env[1800]: time="2025-09-13T00:05:52.048829196Z" level=error msg="encountered an error cleaning up failed sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.049043 env[1800]: time="2025-09-13T00:05:52.048929623Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-rdxkn,Uid:5ac35ace-3aab-4949-a692-f16bda148488,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.049465 kubelet[2910]: E0913 00:05:52.049385 2910 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.049701 kubelet[2910]: E0913 00:05:52.049494 2910 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-rdxkn" Sep 13 00:05:52.049701 kubelet[2910]: E0913 00:05:52.049581 2910 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-54d579b49d-rdxkn" Sep 13 00:05:52.049840 kubelet[2910]: E0913 00:05:52.049727 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-54d579b49d-rdxkn_calico-system(5ac35ace-3aab-4949-a692-f16bda148488)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-54d579b49d-rdxkn_calico-system(5ac35ace-3aab-4949-a692-f16bda148488)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-rdxkn" podUID="5ac35ace-3aab-4949-a692-f16bda148488" Sep 13 00:05:52.053073 env[1800]: time="2025-09-13T00:05:52.052997162Z" level=error msg="StopPodSandbox for \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\" failed" error="failed to destroy network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.053940 kubelet[2910]: E0913 00:05:52.053745 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:05:52.053940 kubelet[2910]: E0913 00:05:52.053883 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b"} Sep 13 00:05:52.054474 kubelet[2910]: E0913 00:05:52.054398 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb741d37-7d49-431e-9106-0f883bed0386\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:52.055079 kubelet[2910]: E0913 00:05:52.055010 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb741d37-7d49-431e-9106-0f883bed0386\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-kfggq" podUID="cb741d37-7d49-431e-9106-0f883bed0386" Sep 13 00:05:52.464995 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f-shm.mount: Deactivated successfully. Sep 13 00:05:52.465292 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba-shm.mount: Deactivated successfully. Sep 13 00:05:52.465433 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9-shm.mount: Deactivated successfully. Sep 13 00:05:52.694250 kubelet[2910]: I0913 00:05:52.693909 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:05:52.699468 env[1800]: time="2025-09-13T00:05:52.699405605Z" level=info msg="StopPodSandbox for \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\"" Sep 13 00:05:52.700938 kubelet[2910]: I0913 00:05:52.700898 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:05:52.706904 env[1800]: time="2025-09-13T00:05:52.706822907Z" level=info msg="StopPodSandbox for \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\"" Sep 13 00:05:52.710521 kubelet[2910]: I0913 00:05:52.710458 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:05:52.714388 env[1800]: time="2025-09-13T00:05:52.714332369Z" level=info msg="StopPodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\"" Sep 13 00:05:52.720554 kubelet[2910]: I0913 00:05:52.718769 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:05:52.725187 env[1800]: time="2025-09-13T00:05:52.725130905Z" level=info msg="StopPodSandbox for \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\"" Sep 13 00:05:52.726062 kubelet[2910]: I0913 00:05:52.725967 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:05:52.727433 env[1800]: time="2025-09-13T00:05:52.727365620Z" level=info msg="StopPodSandbox for \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\"" Sep 13 00:05:52.742441 kubelet[2910]: I0913 00:05:52.741340 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:05:52.746817 env[1800]: time="2025-09-13T00:05:52.746749491Z" level=info msg="StopPodSandbox for \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\"" Sep 13 00:05:52.912957 env[1800]: time="2025-09-13T00:05:52.912852654Z" level=error msg="StopPodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" failed" error="failed to destroy network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.913551 kubelet[2910]: E0913 00:05:52.913372 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:05:52.913551 kubelet[2910]: E0913 00:05:52.913461 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681"} Sep 13 00:05:52.914009 kubelet[2910]: E0913 00:05:52.913840 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a8be4b28-8b5c-4ca5-b13d-63f217abdcee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:52.914009 kubelet[2910]: E0913 00:05:52.913924 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a8be4b28-8b5c-4ca5-b13d-63f217abdcee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-f8688475b-gfns6" podUID="a8be4b28-8b5c-4ca5-b13d-63f217abdcee" Sep 13 00:05:52.921700 env[1800]: time="2025-09-13T00:05:52.921607996Z" level=error msg="StopPodSandbox for \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\" failed" error="failed to destroy network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.922480 kubelet[2910]: E0913 00:05:52.922135 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:05:52.922480 kubelet[2910]: E0913 00:05:52.922224 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28"} Sep 13 00:05:52.922480 kubelet[2910]: E0913 00:05:52.922285 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"87c5762d-a899-497f-9d70-e924d2675a2b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:52.922480 kubelet[2910]: E0913 00:05:52.922352 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"87c5762d-a899-497f-9d70-e924d2675a2b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6d6b67b765-5gpr5" podUID="87c5762d-a899-497f-9d70-e924d2675a2b" Sep 13 00:05:52.965101 env[1800]: time="2025-09-13T00:05:52.965026033Z" level=error msg="StopPodSandbox for \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\" failed" error="failed to destroy network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.965936 kubelet[2910]: E0913 00:05:52.965642 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:05:52.965936 kubelet[2910]: E0913 00:05:52.965732 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba"} Sep 13 00:05:52.965936 kubelet[2910]: E0913 00:05:52.965819 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a1b1282-a990-45e1-9198-e7947e011e69\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:52.965936 kubelet[2910]: E0913 00:05:52.965884 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a1b1282-a990-45e1-9198-e7947e011e69\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6tbpg" podUID="0a1b1282-a990-45e1-9198-e7947e011e69" Sep 13 00:05:52.975806 env[1800]: time="2025-09-13T00:05:52.975595121Z" level=error msg="StopPodSandbox for \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\" failed" error="failed to destroy network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.976545 kubelet[2910]: E0913 00:05:52.976177 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:05:52.976545 kubelet[2910]: E0913 00:05:52.976291 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f"} Sep 13 00:05:52.976545 kubelet[2910]: E0913 00:05:52.976348 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5ac35ace-3aab-4949-a692-f16bda148488\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:52.976545 kubelet[2910]: E0913 00:05:52.976423 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5ac35ace-3aab-4949-a692-f16bda148488\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-54d579b49d-rdxkn" podUID="5ac35ace-3aab-4949-a692-f16bda148488" Sep 13 00:05:52.987988 env[1800]: time="2025-09-13T00:05:52.987908112Z" level=error msg="StopPodSandbox for \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\" failed" error="failed to destroy network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.988898 kubelet[2910]: E0913 00:05:52.988576 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:05:52.988898 kubelet[2910]: E0913 00:05:52.988677 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2"} Sep 13 00:05:52.988898 kubelet[2910]: E0913 00:05:52.988759 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b1e8d677-ddcc-4797-9a2b-15289c5f278d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:52.988898 kubelet[2910]: E0913 00:05:52.988826 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b1e8d677-ddcc-4797-9a2b-15289c5f278d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6764956d8d-gcsgl" podUID="b1e8d677-ddcc-4797-9a2b-15289c5f278d" Sep 13 00:05:52.992245 env[1800]: time="2025-09-13T00:05:52.992163008Z" level=error msg="StopPodSandbox for \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\" failed" error="failed to destroy network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:05:52.993102 kubelet[2910]: E0913 00:05:52.992750 2910 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:05:52.993102 kubelet[2910]: E0913 00:05:52.992874 2910 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9"} Sep 13 00:05:52.993102 kubelet[2910]: E0913 00:05:52.992932 2910 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"826cb41c-6196-44e2-8067-26a5b78bea02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:05:52.993102 kubelet[2910]: E0913 00:05:52.993022 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"826cb41c-6196-44e2-8067-26a5b78bea02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-xhbkk" podUID="826cb41c-6196-44e2-8067-26a5b78bea02" Sep 13 00:05:57.530000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.534447 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 00:05:57.534589 kernel: audit: type=1400 audit(1757721957.530:1041): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.530000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40075faa80 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.556216 kernel: audit: type=1300 audit(1757721957.530:1041): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40075faa80 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.558080 kernel: audit: type=1327 audit(1757721957.530:1041): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:57.530000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:57.542000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.576920 kernel: audit: type=1400 audit(1757721957.542:1042): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.542000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4003e6bbf0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.589525 kernel: audit: type=1300 audit(1757721957.542:1042): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4003e6bbf0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.591278 kernel: audit: type=1327 audit(1757721957.542:1042): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:57.542000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:57.542000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6791 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.609859 kernel: audit: type=1400 audit(1757721957.542:1043): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6791 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.610029 kernel: audit: type=1300 audit(1757721957.542:1043): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40028cb650 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.542000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40028cb650 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.542000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:57.632101 kernel: audit: type=1327 audit(1757721957.542:1043): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:57.632473 kernel: audit: type=1400 audit(1757721957.565:1044): avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6799 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.565000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6799 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.565000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40058e8210 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.565000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:57.608000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.608000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:57.608000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40030bebc0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.608000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40042b0510 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:05:57.608000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:57.608000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:05:59.083000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:59.084000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:05:59.084000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011ab290 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:59.084000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:05:59.083000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c020e0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:05:59.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:06:00.253733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3206931150.mount: Deactivated successfully. Sep 13 00:06:00.302302 env[1800]: time="2025-09-13T00:06:00.302209537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:00.305944 env[1800]: time="2025-09-13T00:06:00.305888927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:00.309548 env[1800]: time="2025-09-13T00:06:00.309445461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:00.314204 env[1800]: time="2025-09-13T00:06:00.314107650Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:00.315815 env[1800]: time="2025-09-13T00:06:00.315740174Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 13 00:06:00.351876 env[1800]: time="2025-09-13T00:06:00.351794610Z" level=info msg="CreateContainer within sandbox \"febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:06:00.382872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3521571577.mount: Deactivated successfully. Sep 13 00:06:00.387982 env[1800]: time="2025-09-13T00:06:00.387887430Z" level=info msg="CreateContainer within sandbox \"febe423b6bb9a35e7008fbe0966f9dc2a169b39b63144630b30dcdd6fb4158a4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0c8c72498f450532041009ee4e2c4bccc4b9b22ecdb541323e57165ec85cce4e\"" Sep 13 00:06:00.391034 env[1800]: time="2025-09-13T00:06:00.390969099Z" level=info msg="StartContainer for \"0c8c72498f450532041009ee4e2c4bccc4b9b22ecdb541323e57165ec85cce4e\"" Sep 13 00:06:00.429683 systemd[1]: Started cri-containerd-0c8c72498f450532041009ee4e2c4bccc4b9b22ecdb541323e57165ec85cce4e.scope. Sep 13 00:06:00.525000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.525000 audit[4138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3442 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:00.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063386337323439386634353035333230343130303965653465326334 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit: BPF prog-id=146 op=LOAD Sep 13 00:06:00.526000 audit[4138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3442 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:00.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063386337323439386634353035333230343130303965653465326334 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.526000 audit: BPF prog-id=147 op=LOAD Sep 13 00:06:00.526000 audit[4138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3442 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:00.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063386337323439386634353035333230343130303965653465326334 Sep 13 00:06:00.527000 audit: BPF prog-id=147 op=UNLOAD Sep 13 00:06:00.527000 audit: BPF prog-id=146 op=UNLOAD Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { perfmon } for pid=4138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit[4138]: AVC avc: denied { bpf } for pid=4138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:00.527000 audit: BPF prog-id=148 op=LOAD Sep 13 00:06:00.527000 audit[4138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3442 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:00.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063386337323439386634353035333230343130303965653465326334 Sep 13 00:06:00.565093 env[1800]: time="2025-09-13T00:06:00.565028866Z" level=info msg="StartContainer for \"0c8c72498f450532041009ee4e2c4bccc4b9b22ecdb541323e57165ec85cce4e\" returns successfully" Sep 13 00:06:00.924624 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:06:00.924865 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:06:01.137408 kubelet[2910]: I0913 00:06:01.137306 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-p2t5k" podStartSLOduration=2.168983335 podStartE2EDuration="22.137282822s" podCreationTimestamp="2025-09-13 00:05:39 +0000 UTC" firstStartedPulling="2025-09-13 00:05:40.349832183 +0000 UTC m=+38.281069700" lastFinishedPulling="2025-09-13 00:06:00.31813167 +0000 UTC m=+58.249369187" observedRunningTime="2025-09-13 00:06:00.833704723 +0000 UTC m=+58.764942276" watchObservedRunningTime="2025-09-13 00:06:01.137282822 +0000 UTC m=+59.068520339" Sep 13 00:06:01.139130 env[1800]: time="2025-09-13T00:06:01.139062035Z" level=info msg="StopPodSandbox for \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\"" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.335 [INFO][4205] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.339 [INFO][4205] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" iface="eth0" netns="/var/run/netns/cni-6ac6b258-87aa-a85f-86e2-449a7492d43a" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.340 [INFO][4205] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" iface="eth0" netns="/var/run/netns/cni-6ac6b258-87aa-a85f-86e2-449a7492d43a" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.342 [INFO][4205] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" iface="eth0" netns="/var/run/netns/cni-6ac6b258-87aa-a85f-86e2-449a7492d43a" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.342 [INFO][4205] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.342 [INFO][4205] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.446 [INFO][4220] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.446 [INFO][4220] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.447 [INFO][4220] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.463 [WARNING][4220] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.464 [INFO][4220] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.468 [INFO][4220] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:01.477712 env[1800]: 2025-09-13 00:06:01.474 [INFO][4205] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:01.483834 systemd[1]: run-netns-cni\x2d6ac6b258\x2d87aa\x2da85f\x2d86e2\x2d449a7492d43a.mount: Deactivated successfully. Sep 13 00:06:01.488940 env[1800]: time="2025-09-13T00:06:01.488797140Z" level=info msg="TearDown network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\" successfully" Sep 13 00:06:01.488940 env[1800]: time="2025-09-13T00:06:01.488928959Z" level=info msg="StopPodSandbox for \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\" returns successfully" Sep 13 00:06:01.616304 kubelet[2910]: I0913 00:06:01.616245 2910 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/87c5762d-a899-497f-9d70-e924d2675a2b-whisker-backend-key-pair\") pod \"87c5762d-a899-497f-9d70-e924d2675a2b\" (UID: \"87c5762d-a899-497f-9d70-e924d2675a2b\") " Sep 13 00:06:01.616544 kubelet[2910]: I0913 00:06:01.616332 2910 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87c5762d-a899-497f-9d70-e924d2675a2b-whisker-ca-bundle\") pod \"87c5762d-a899-497f-9d70-e924d2675a2b\" (UID: \"87c5762d-a899-497f-9d70-e924d2675a2b\") " Sep 13 00:06:01.616544 kubelet[2910]: I0913 00:06:01.616401 2910 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-7jdmf\" (UniqueName: \"kubernetes.io/projected/87c5762d-a899-497f-9d70-e924d2675a2b-kube-api-access-7jdmf\") pod \"87c5762d-a899-497f-9d70-e924d2675a2b\" (UID: \"87c5762d-a899-497f-9d70-e924d2675a2b\") " Sep 13 00:06:01.618798 kubelet[2910]: I0913 00:06:01.618704 2910 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/87c5762d-a899-497f-9d70-e924d2675a2b-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "87c5762d-a899-497f-9d70-e924d2675a2b" (UID: "87c5762d-a899-497f-9d70-e924d2675a2b"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Sep 13 00:06:01.636665 kubelet[2910]: I0913 00:06:01.627772 2910 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/87c5762d-a899-497f-9d70-e924d2675a2b-kube-api-access-7jdmf" (OuterVolumeSpecName: "kube-api-access-7jdmf") pod "87c5762d-a899-497f-9d70-e924d2675a2b" (UID: "87c5762d-a899-497f-9d70-e924d2675a2b"). InnerVolumeSpecName "kube-api-access-7jdmf". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 13 00:06:01.636665 kubelet[2910]: I0913 00:06:01.629734 2910 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/87c5762d-a899-497f-9d70-e924d2675a2b-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "87c5762d-a899-497f-9d70-e924d2675a2b" (UID: "87c5762d-a899-497f-9d70-e924d2675a2b"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 13 00:06:01.632485 systemd[1]: var-lib-kubelet-pods-87c5762d\x2da899\x2d497f\x2d9d70\x2de924d2675a2b-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d7jdmf.mount: Deactivated successfully. Sep 13 00:06:01.632701 systemd[1]: var-lib-kubelet-pods-87c5762d\x2da899\x2d497f\x2d9d70\x2de924d2675a2b-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Sep 13 00:06:01.717158 kubelet[2910]: I0913 00:06:01.717108 2910 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/87c5762d-a899-497f-9d70-e924d2675a2b-whisker-backend-key-pair\") on node \"ip-172-31-27-21\" DevicePath \"\"" Sep 13 00:06:01.717426 kubelet[2910]: I0913 00:06:01.717401 2910 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/87c5762d-a899-497f-9d70-e924d2675a2b-whisker-ca-bundle\") on node \"ip-172-31-27-21\" DevicePath \"\"" Sep 13 00:06:01.717631 kubelet[2910]: I0913 00:06:01.717608 2910 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-7jdmf\" (UniqueName: \"kubernetes.io/projected/87c5762d-a899-497f-9d70-e924d2675a2b-kube-api-access-7jdmf\") on node \"ip-172-31-27-21\" DevicePath \"\"" Sep 13 00:06:01.791167 systemd[1]: Removed slice kubepods-besteffort-pod87c5762d_a899_497f_9d70_e924d2675a2b.slice. Sep 13 00:06:01.931800 systemd[1]: Created slice kubepods-besteffort-podf993b94c_00d3_46b2_9e6c_8d8c040520a1.slice. Sep 13 00:06:02.021997 kubelet[2910]: I0913 00:06:02.021199 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f993b94c-00d3-46b2-9e6c-8d8c040520a1-whisker-backend-key-pair\") pod \"whisker-867bc58656-kbrt4\" (UID: \"f993b94c-00d3-46b2-9e6c-8d8c040520a1\") " pod="calico-system/whisker-867bc58656-kbrt4" Sep 13 00:06:02.022302 kubelet[2910]: I0913 00:06:02.022270 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f993b94c-00d3-46b2-9e6c-8d8c040520a1-whisker-ca-bundle\") pod \"whisker-867bc58656-kbrt4\" (UID: \"f993b94c-00d3-46b2-9e6c-8d8c040520a1\") " pod="calico-system/whisker-867bc58656-kbrt4" Sep 13 00:06:02.022493 kubelet[2910]: I0913 00:06:02.022466 2910 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xnffj\" (UniqueName: \"kubernetes.io/projected/f993b94c-00d3-46b2-9e6c-8d8c040520a1-kube-api-access-xnffj\") pod \"whisker-867bc58656-kbrt4\" (UID: \"f993b94c-00d3-46b2-9e6c-8d8c040520a1\") " pod="calico-system/whisker-867bc58656-kbrt4" Sep 13 00:06:02.240254 env[1800]: time="2025-09-13T00:06:02.239767694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-867bc58656-kbrt4,Uid:f993b94c-00d3-46b2-9e6c-8d8c040520a1,Namespace:calico-system,Attempt:0,}" Sep 13 00:06:02.261150 systemd[1]: run-containerd-runc-k8s.io-0c8c72498f450532041009ee4e2c4bccc4b9b22ecdb541323e57165ec85cce4e-runc.Iruj3f.mount: Deactivated successfully. Sep 13 00:06:02.375827 env[1800]: time="2025-09-13T00:06:02.375734323Z" level=info msg="StopPodSandbox for \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\"" Sep 13 00:06:02.408555 kubelet[2910]: I0913 00:06:02.408465 2910 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="87c5762d-a899-497f-9d70-e924d2675a2b" path="/var/lib/kubelet/pods/87c5762d-a899-497f-9d70-e924d2675a2b/volumes" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.537 [WARNING][4281] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.537 [INFO][4281] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.538 [INFO][4281] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" iface="eth0" netns="" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.538 [INFO][4281] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.538 [INFO][4281] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.628 [INFO][4295] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.629 [INFO][4295] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.662 [INFO][4295] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.678 [WARNING][4295] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.678 [INFO][4295] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.681 [INFO][4295] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:02.687011 env[1800]: 2025-09-13 00:06:02.684 [INFO][4281] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:02.688343 env[1800]: time="2025-09-13T00:06:02.686971533Z" level=info msg="TearDown network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\" successfully" Sep 13 00:06:02.688343 env[1800]: time="2025-09-13T00:06:02.687296139Z" level=info msg="StopPodSandbox for \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\" returns successfully" Sep 13 00:06:02.689345 env[1800]: time="2025-09-13T00:06:02.689288577Z" level=info msg="RemovePodSandbox for \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\"" Sep 13 00:06:02.689998 env[1800]: time="2025-09-13T00:06:02.689901947Z" level=info msg="Forcibly stopping sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\"" Sep 13 00:06:02.696135 (udev-worker)[4179]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:06:02.719091 systemd-networkd[1518]: cali09469adeaf6: Link UP Sep 13 00:06:02.721039 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:06:02.721254 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali09469adeaf6: link becomes ready Sep 13 00:06:02.721662 systemd-networkd[1518]: cali09469adeaf6: Gained carrier Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.423 [INFO][4261] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.454 [INFO][4261] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0 whisker-867bc58656- calico-system f993b94c-00d3-46b2-9e6c-8d8c040520a1 997 0 2025-09-13 00:06:01 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:867bc58656 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ip-172-31-27-21 whisker-867bc58656-kbrt4 eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali09469adeaf6 [] [] }} ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Namespace="calico-system" Pod="whisker-867bc58656-kbrt4" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.454 [INFO][4261] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Namespace="calico-system" Pod="whisker-867bc58656-kbrt4" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.574 [INFO][4287] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" HandleID="k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Workload="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.576 [INFO][4287] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" HandleID="k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Workload="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cb6c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-21", "pod":"whisker-867bc58656-kbrt4", "timestamp":"2025-09-13 00:06:02.574404268 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.576 [INFO][4287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.576 [INFO][4287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.577 [INFO][4287] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.600 [INFO][4287] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.611 [INFO][4287] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.621 [INFO][4287] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.625 [INFO][4287] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.630 [INFO][4287] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.630 [INFO][4287] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.641 [INFO][4287] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.652 [INFO][4287] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.662 [INFO][4287] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.129/26] block=192.168.39.128/26 handle="k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.662 [INFO][4287] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.129/26] handle="k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" host="ip-172-31-27-21" Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.664 [INFO][4287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:02.785578 env[1800]: 2025-09-13 00:06:02.665 [INFO][4287] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.129/26] IPv6=[] ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" HandleID="k8s-pod-network.884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Workload="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" Sep 13 00:06:02.787800 env[1800]: 2025-09-13 00:06:02.675 [INFO][4261] cni-plugin/k8s.go 418: Populated endpoint ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Namespace="calico-system" Pod="whisker-867bc58656-kbrt4" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0", GenerateName:"whisker-867bc58656-", Namespace:"calico-system", SelfLink:"", UID:"f993b94c-00d3-46b2-9e6c-8d8c040520a1", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"867bc58656", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"whisker-867bc58656-kbrt4", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.39.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali09469adeaf6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:02.787800 env[1800]: 2025-09-13 00:06:02.675 [INFO][4261] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.129/32] ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Namespace="calico-system" Pod="whisker-867bc58656-kbrt4" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" Sep 13 00:06:02.787800 env[1800]: 2025-09-13 00:06:02.675 [INFO][4261] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali09469adeaf6 ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Namespace="calico-system" Pod="whisker-867bc58656-kbrt4" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" Sep 13 00:06:02.787800 env[1800]: 2025-09-13 00:06:02.725 [INFO][4261] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Namespace="calico-system" Pod="whisker-867bc58656-kbrt4" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" Sep 13 00:06:02.787800 env[1800]: 2025-09-13 00:06:02.725 [INFO][4261] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Namespace="calico-system" Pod="whisker-867bc58656-kbrt4" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0", GenerateName:"whisker-867bc58656-", Namespace:"calico-system", SelfLink:"", UID:"f993b94c-00d3-46b2-9e6c-8d8c040520a1", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 6, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"867bc58656", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed", Pod:"whisker-867bc58656-kbrt4", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.39.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali09469adeaf6", MAC:"9a:d9:30:f0:22:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:02.787800 env[1800]: 2025-09-13 00:06:02.775 [INFO][4261] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed" Namespace="calico-system" Pod="whisker-867bc58656-kbrt4" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--867bc58656--kbrt4-eth0" Sep 13 00:06:02.798000 audit[4349]: AVC avc: denied { write } for pid=4349 comm="tee" name="fd" dev="proc" ino=21445 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:02.801659 kernel: kauditd_printk_skb: 57 callbacks suppressed Sep 13 00:06:02.801796 kernel: audit: type=1400 audit(1757721962.798:1055): avc: denied { write } for pid=4349 comm="tee" name="fd" dev="proc" ino=21445 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:02.798000 audit[4349]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc95f37e5 a2=241 a3=1b6 items=1 ppid=4321 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:02.824478 kernel: audit: type=1300 audit(1757721962.798:1055): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc95f37e5 a2=241 a3=1b6 items=1 ppid=4321 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:02.798000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:06:02.828092 kernel: audit: type=1307 audit(1757721962.798:1055): cwd="/etc/service/enabled/bird6/log" Sep 13 00:06:02.798000 audit: PATH item=0 name="/dev/fd/63" inode=21434 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:02.836421 kernel: audit: type=1302 audit(1757721962.798:1055): item=0 name="/dev/fd/63" inode=21434 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:02.798000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:02.845164 kernel: audit: type=1327 audit(1757721962.798:1055): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:02.885000 audit[4387]: AVC avc: denied { write } for pid=4387 comm="tee" name="fd" dev="proc" ino=22375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:02.898503 env[1800]: time="2025-09-13T00:06:02.897675766Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:02.898503 env[1800]: time="2025-09-13T00:06:02.897773881Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:02.898503 env[1800]: time="2025-09-13T00:06:02.897829124Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:02.903656 kernel: audit: type=1400 audit(1757721962.885:1056): avc: denied { write } for pid=4387 comm="tee" name="fd" dev="proc" ino=22375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:02.885000 audit[4387]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe85587d5 a2=241 a3=1b6 items=1 ppid=4334 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:02.932145 env[1800]: time="2025-09-13T00:06:02.919545177Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed pid=4372 runtime=io.containerd.runc.v2 Sep 13 00:06:02.885000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:06:02.938343 kernel: audit: type=1300 audit(1757721962.885:1056): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe85587d5 a2=241 a3=1b6 items=1 ppid=4334 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:02.938525 kernel: audit: type=1307 audit(1757721962.885:1056): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:06:02.885000 audit: PATH item=0 name="/dev/fd/63" inode=21488 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:02.954313 kernel: audit: type=1302 audit(1757721962.885:1056): item=0 name="/dev/fd/63" inode=21488 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:02.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:02.964617 kernel: audit: type=1327 audit(1757721962.885:1056): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:02.962000 audit[4400]: AVC avc: denied { write } for pid=4400 comm="tee" name="fd" dev="proc" ino=22537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:02.962000 audit[4400]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc8d947e6 a2=241 a3=1b6 items=1 ppid=4335 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:02.962000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:06:02.962000 audit: PATH item=0 name="/dev/fd/63" inode=21497 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:02.962000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:03.021000 audit[4410]: AVC avc: denied { write } for pid=4410 comm="tee" name="fd" dev="proc" ino=22396 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:03.021000 audit[4410]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc282b7e5 a2=241 a3=1b6 items=1 ppid=4331 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.021000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:06:03.021000 audit: PATH item=0 name="/dev/fd/63" inode=22533 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:03.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:03.053000 audit[4405]: AVC avc: denied { write } for pid=4405 comm="tee" name="fd" dev="proc" ino=22557 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:03.053000 audit[4405]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc70697e5 a2=241 a3=1b6 items=1 ppid=4324 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.053000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:06:03.053000 audit: PATH item=0 name="/dev/fd/63" inode=22532 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:03.053000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:03.061000 audit[4426]: AVC avc: denied { write } for pid=4426 comm="tee" name="fd" dev="proc" ino=22426 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:03.061000 audit[4426]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb1407e7 a2=241 a3=1b6 items=1 ppid=4337 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.061000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:06:03.061000 audit: PATH item=0 name="/dev/fd/63" inode=22546 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:03.061000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:03.069000 audit[4412]: AVC avc: denied { write } for pid=4412 comm="tee" name="fd" dev="proc" ino=22565 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:06:03.069000 audit[4412]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff2ecc7d6 a2=241 a3=1b6 items=1 ppid=4338 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.069000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:06:03.069000 audit: PATH item=0 name="/dev/fd/63" inode=22534 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:06:03.069000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:06:03.079347 systemd[1]: Started cri-containerd-884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed.scope. Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:02.998 [WARNING][4327] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" WorkloadEndpoint="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:02.999 [INFO][4327] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:02.999 [INFO][4327] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" iface="eth0" netns="" Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:02.999 [INFO][4327] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:02.999 [INFO][4327] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:03.176 [INFO][4421] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:03.182 [INFO][4421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:03.182 [INFO][4421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:03.208 [WARNING][4421] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:03.208 [INFO][4421] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" HandleID="k8s-pod-network.a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Workload="ip--172--31--27--21-k8s-whisker--6d6b67b765--5gpr5-eth0" Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:03.211 [INFO][4421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:03.217551 env[1800]: 2025-09-13 00:06:03.214 [INFO][4327] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28" Sep 13 00:06:03.218624 env[1800]: time="2025-09-13T00:06:03.218567658Z" level=info msg="TearDown network for sandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\" successfully" Sep 13 00:06:03.225793 env[1800]: time="2025-09-13T00:06:03.225709228Z" level=info msg="RemovePodSandbox \"a1f3e4412694bfb00dcbef5f12cb7eb817376b9d5b753a34ef529750c1486e28\" returns successfully" Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.243000 audit: BPF prog-id=149 op=LOAD Sep 13 00:06:03.245000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.245000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4372 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346635613336306130306532633661353164316536363137316530 Sep 13 00:06:03.245000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.245000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4372 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346635613336306130306532633661353164316536363137316530 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit: BPF prog-id=150 op=LOAD Sep 13 00:06:03.246000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4372 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346635613336306130306532633661353164316536363137316530 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit: BPF prog-id=151 op=LOAD Sep 13 00:06:03.246000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4372 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346635613336306130306532633661353164316536363137316530 Sep 13 00:06:03.246000 audit: BPF prog-id=151 op=UNLOAD Sep 13 00:06:03.246000 audit: BPF prog-id=150 op=UNLOAD Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.246000 audit: BPF prog-id=152 op=LOAD Sep 13 00:06:03.246000 audit[4397]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4372 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838346635613336306130306532633661353164316536363137316530 Sep 13 00:06:03.257407 systemd[1]: run-containerd-runc-k8s.io-884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed-runc.3X4VHp.mount: Deactivated successfully. Sep 13 00:06:03.341421 env[1800]: time="2025-09-13T00:06:03.341359897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-867bc58656-kbrt4,Uid:f993b94c-00d3-46b2-9e6c-8d8c040520a1,Namespace:calico-system,Attempt:0,} returns sandbox id \"884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed\"" Sep 13 00:06:03.344877 env[1800]: time="2025-09-13T00:06:03.344801832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\"" Sep 13 00:06:03.403285 env[1800]: time="2025-09-13T00:06:03.403207350Z" level=info msg="StopPodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\"" Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.630000 audit: BPF prog-id=153 op=LOAD Sep 13 00:06:03.630000 audit[4494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd26c8d88 a2=98 a3=ffffd26c8d78 items=0 ppid=4345 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.630000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:06:03.630000 audit: BPF prog-id=153 op=UNLOAD Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.631000 audit: BPF prog-id=154 op=LOAD Sep 13 00:06:03.631000 audit[4494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd26c8c38 a2=74 a3=95 items=0 ppid=4345 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.631000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:06:03.632000 audit: BPF prog-id=154 op=UNLOAD Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit: BPF prog-id=155 op=LOAD Sep 13 00:06:03.632000 audit[4494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd26c8c68 a2=40 a3=ffffd26c8c98 items=0 ppid=4345 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.632000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:06:03.632000 audit: BPF prog-id=155 op=UNLOAD Sep 13 00:06:03.632000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.632000 audit[4494]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffd26c8d80 a2=50 a3=0 items=0 ppid=4345 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.632000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.511 [INFO][4475] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.512 [INFO][4475] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" iface="eth0" netns="/var/run/netns/cni-2ae3d54d-cab8-4691-3957-77dde63bdcc2" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.513 [INFO][4475] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" iface="eth0" netns="/var/run/netns/cni-2ae3d54d-cab8-4691-3957-77dde63bdcc2" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.514 [INFO][4475] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" iface="eth0" netns="/var/run/netns/cni-2ae3d54d-cab8-4691-3957-77dde63bdcc2" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.514 [INFO][4475] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.514 [INFO][4475] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.597 [INFO][4484] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.603 [INFO][4484] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.603 [INFO][4484] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.623 [WARNING][4484] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.623 [INFO][4484] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.627 [INFO][4484] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:03.642232 env[1800]: 2025-09-13 00:06:03.637 [INFO][4475] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:06:03.647745 env[1800]: time="2025-09-13T00:06:03.647132055Z" level=info msg="TearDown network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" successfully" Sep 13 00:06:03.647745 env[1800]: time="2025-09-13T00:06:03.647193106Z" level=info msg="StopPodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" returns successfully" Sep 13 00:06:03.648332 systemd[1]: run-netns-cni\x2d2ae3d54d\x2dcab8\x2d4691\x2d3957\x2d77dde63bdcc2.mount: Deactivated successfully. Sep 13 00:06:03.650875 env[1800]: time="2025-09-13T00:06:03.649214478Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f8688475b-snkh7,Uid:86eab1aa-9333-4320-8fc8-683957d99836,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.690000 audit: BPF prog-id=156 op=LOAD Sep 13 00:06:03.690000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd3fd7048 a2=98 a3=ffffd3fd7038 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.690000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:03.697000 audit: BPF prog-id=156 op=UNLOAD Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.697000 audit: BPF prog-id=157 op=LOAD Sep 13 00:06:03.697000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3fd6cd8 a2=74 a3=95 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:03.715000 audit: BPF prog-id=157 op=UNLOAD Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:03.715000 audit: BPF prog-id=158 op=LOAD Sep 13 00:06:03.715000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3fd6d38 a2=94 a3=2 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:03.715000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:03.718000 audit: BPF prog-id=158 op=UNLOAD Sep 13 00:06:03.775163 systemd-networkd[1518]: cali09469adeaf6: Gained IPv6LL Sep 13 00:06:04.027864 systemd-networkd[1518]: cali6359d8ef051: Link UP Sep 13 00:06:04.034316 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:06:04.035499 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6359d8ef051: link becomes ready Sep 13 00:06:04.034804 systemd-networkd[1518]: cali6359d8ef051: Gained carrier Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.811 [INFO][4501] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0 calico-apiserver-f8688475b- calico-apiserver 86eab1aa-9333-4320-8fc8-683957d99836 1005 0 2025-09-13 00:05:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:f8688475b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-21 calico-apiserver-f8688475b-snkh7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6359d8ef051 [] [] }} ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-snkh7" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.811 [INFO][4501] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-snkh7" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.903 [INFO][4509] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.905 [INFO][4509] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002cb600), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-21", "pod":"calico-apiserver-f8688475b-snkh7", "timestamp":"2025-09-13 00:06:03.903137263 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.906 [INFO][4509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.906 [INFO][4509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.906 [INFO][4509] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.931 [INFO][4509] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.939 [INFO][4509] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.948 [INFO][4509] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.952 [INFO][4509] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.958 [INFO][4509] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.958 [INFO][4509] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.966 [INFO][4509] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:03.988 [INFO][4509] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:04.003 [INFO][4509] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.130/26] block=192.168.39.128/26 handle="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:04.004 [INFO][4509] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.130/26] handle="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" host="ip-172-31-27-21" Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:04.004 [INFO][4509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:04.074292 env[1800]: 2025-09-13 00:06:04.004 [INFO][4509] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.130/26] IPv6=[] ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:04.076069 env[1800]: 2025-09-13 00:06:04.007 [INFO][4501] cni-plugin/k8s.go 418: Populated endpoint ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-snkh7" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0", GenerateName:"calico-apiserver-f8688475b-", Namespace:"calico-apiserver", SelfLink:"", UID:"86eab1aa-9333-4320-8fc8-683957d99836", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f8688475b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"calico-apiserver-f8688475b-snkh7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6359d8ef051", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:04.076069 env[1800]: 2025-09-13 00:06:04.012 [INFO][4501] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.130/32] ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-snkh7" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:04.076069 env[1800]: 2025-09-13 00:06:04.012 [INFO][4501] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6359d8ef051 ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-snkh7" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:04.076069 env[1800]: 2025-09-13 00:06:04.038 [INFO][4501] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-snkh7" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:04.076069 env[1800]: 2025-09-13 00:06:04.038 [INFO][4501] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-snkh7" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0", GenerateName:"calico-apiserver-f8688475b-", Namespace:"calico-apiserver", SelfLink:"", UID:"86eab1aa-9333-4320-8fc8-683957d99836", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f8688475b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c", Pod:"calico-apiserver-f8688475b-snkh7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6359d8ef051", MAC:"ba:ea:32:53:27:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:04.076069 env[1800]: 2025-09-13 00:06:04.071 [INFO][4501] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-snkh7" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:04.108024 env[1800]: time="2025-09-13T00:06:04.107417643Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:04.108024 env[1800]: time="2025-09-13T00:06:04.107524458Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:04.108024 env[1800]: time="2025-09-13T00:06:04.107558763Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:04.110040 env[1800]: time="2025-09-13T00:06:04.108366183Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c pid=4535 runtime=io.containerd.runc.v2 Sep 13 00:06:04.175604 systemd[1]: Started cri-containerd-23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c.scope. Sep 13 00:06:04.406124 env[1800]: time="2025-09-13T00:06:04.405972485Z" level=info msg="StopPodSandbox for \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\"" Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.465000 audit: BPF prog-id=159 op=LOAD Sep 13 00:06:04.472000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.472000 audit[4544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623432613465633963373333643939396139363930373034653035 Sep 13 00:06:04.480000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.480000 audit[4544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623432613465633963373333643939396139363930373034653035 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.483000 audit: BPF prog-id=160 op=LOAD Sep 13 00:06:04.483000 audit[4544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623432613465633963373333643939396139363930373034653035 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.485000 audit: BPF prog-id=161 op=LOAD Sep 13 00:06:04.485000 audit[4544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623432613465633963373333643939396139363930373034653035 Sep 13 00:06:04.490000 audit: BPF prog-id=161 op=UNLOAD Sep 13 00:06:04.491000 audit: BPF prog-id=160 op=UNLOAD Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.491000 audit: BPF prog-id=162 op=LOAD Sep 13 00:06:04.491000 audit[4544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233623432613465633963373333643939396139363930373034653035 Sep 13 00:06:04.727406 env[1800]: time="2025-09-13T00:06:04.727315287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f8688475b-snkh7,Uid:86eab1aa-9333-4320-8fc8-683957d99836,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\"" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.623 [INFO][4577] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.624 [INFO][4577] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" iface="eth0" netns="/var/run/netns/cni-7d39a1e6-a4db-d622-3810-25bb71a7dc36" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.624 [INFO][4577] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" iface="eth0" netns="/var/run/netns/cni-7d39a1e6-a4db-d622-3810-25bb71a7dc36" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.624 [INFO][4577] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" iface="eth0" netns="/var/run/netns/cni-7d39a1e6-a4db-d622-3810-25bb71a7dc36" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.624 [INFO][4577] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.625 [INFO][4577] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.734 [INFO][4596] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.735 [INFO][4596] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.735 [INFO][4596] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.768 [WARNING][4596] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.768 [INFO][4596] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.811 [INFO][4596] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:04.819040 env[1800]: 2025-09-13 00:06:04.815 [INFO][4577] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:06:04.823933 env[1800]: time="2025-09-13T00:06:04.823861939Z" level=info msg="TearDown network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\" successfully" Sep 13 00:06:04.824152 env[1800]: time="2025-09-13T00:06:04.824116940Z" level=info msg="StopPodSandbox for \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\" returns successfully" Sep 13 00:06:04.826882 env[1800]: time="2025-09-13T00:06:04.825877856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-rdxkn,Uid:5ac35ace-3aab-4949-a692-f16bda148488,Namespace:calico-system,Attempt:1,}" Sep 13 00:06:04.828317 systemd[1]: run-netns-cni\x2d7d39a1e6\x2da4db\x2dd622\x2d3810\x2d25bb71a7dc36.mount: Deactivated successfully. Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.988000 audit: BPF prog-id=163 op=LOAD Sep 13 00:06:04.988000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3fd6cf8 a2=40 a3=ffffd3fd6d28 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.988000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:04.996000 audit: BPF prog-id=163 op=UNLOAD Sep 13 00:06:04.996000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:04.996000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd3fd6e10 a2=50 a3=0 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:04.996000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.21:22-139.178.89.65:44894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:05.332584 systemd[1]: Started sshd@7-172.31.27.21:22-139.178.89.65:44894.service. Sep 13 00:06:05.347209 systemd-networkd[1518]: calicfe0cd5facc: Link UP Sep 13 00:06:05.354166 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:06:05.354316 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicfe0cd5facc: link becomes ready Sep 13 00:06:05.354594 systemd-networkd[1518]: calicfe0cd5facc: Gained carrier Sep 13 00:06:05.379000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.379000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3fd6d68 a2=28 a3=ffffd3fd6e98 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.379000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.380000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.380000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3fd6d98 a2=28 a3=ffffd3fd6ec8 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.380000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.381000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.381000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3fd6c48 a2=28 a3=ffffd3fd6d78 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.381000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.382000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.382000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3fd6db8 a2=28 a3=ffffd3fd6ee8 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.382000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.382000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.382000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3fd6d98 a2=28 a3=ffffd3fd6ec8 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.382000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.383000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.383000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3fd6d88 a2=28 a3=ffffd3fd6eb8 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.383000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.385000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.385000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3fd6db8 a2=28 a3=ffffd3fd6ee8 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.385000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.386000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.386000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3fd6d98 a2=28 a3=ffffd3fd6ec8 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.387000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.387000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3fd6db8 a2=28 a3=ffffd3fd6ee8 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.387000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.387000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3fd6d88 a2=28 a3=ffffd3fd6eb8 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.387000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.387000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3fd6e08 a2=28 a3=ffffd3fd6f48 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd3fd6b40 a2=50 a3=0 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.391812 env[1800]: time="2025-09-13T00:06:05.390210362Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.389000 audit: BPF prog-id=164 op=LOAD Sep 13 00:06:05.406730 env[1800]: time="2025-09-13T00:06:05.404624202Z" level=info msg="StopPodSandbox for \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\"" Sep 13 00:06:05.407114 env[1800]: time="2025-09-13T00:06:05.407047921Z" level=info msg="StopPodSandbox for \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\"" Sep 13 00:06:05.408290 env[1800]: time="2025-09-13T00:06:05.408239514Z" level=info msg="StopPodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\"" Sep 13 00:06:05.389000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd3fd6b48 a2=94 a3=5 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.410000 audit: BPF prog-id=164 op=UNLOAD Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd3fd6c50 a2=50 a3=0 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd3fd6d98 a2=4 a3=3 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.410000 audit[4496]: AVC avc: denied { confidentiality } for pid=4496 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:05.410000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3fd6d78 a2=94 a3=6 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { confidentiality } for pid=4496 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:05.414000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3fd6548 a2=94 a3=83 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.414000 audit[4496]: AVC avc: denied { confidentiality } for pid=4496 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:05.414000 audit[4496]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3fd6548 a2=94 a3=83 items=0 ppid=4345 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:06:05.423792 env[1800]: time="2025-09-13T00:06:05.423730153Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:270a0129ec34c3ad6ae6d56c0afce111eb0baa25dfdacb63722ec5887bafd3c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:04.962 [INFO][4614] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0 goldmane-54d579b49d- calico-system 5ac35ace-3aab-4949-a692-f16bda148488 1016 0 2025-09-13 00:05:39 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:54d579b49d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ip-172-31-27-21 goldmane-54d579b49d-rdxkn eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calicfe0cd5facc [] [] }} ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Namespace="calico-system" Pod="goldmane-54d579b49d-rdxkn" WorkloadEndpoint="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:04.964 [INFO][4614] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Namespace="calico-system" Pod="goldmane-54d579b49d-rdxkn" WorkloadEndpoint="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.084 [INFO][4625] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" HandleID="k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.085 [INFO][4625] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" HandleID="k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000301ab0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-21", "pod":"goldmane-54d579b49d-rdxkn", "timestamp":"2025-09-13 00:06:05.084069939 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.085 [INFO][4625] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.085 [INFO][4625] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.086 [INFO][4625] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.111 [INFO][4625] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.165 [INFO][4625] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.200 [INFO][4625] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.229 [INFO][4625] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.270 [INFO][4625] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.270 [INFO][4625] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.276 [INFO][4625] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.295 [INFO][4625] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.320 [INFO][4625] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.131/26] block=192.168.39.128/26 handle="k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.320 [INFO][4625] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.131/26] handle="k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" host="ip-172-31-27-21" Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.320 [INFO][4625] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:05.430545 env[1800]: 2025-09-13 00:06:05.320 [INFO][4625] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.131/26] IPv6=[] ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" HandleID="k8s-pod-network.8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:05.431931 env[1800]: 2025-09-13 00:06:05.324 [INFO][4614] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Namespace="calico-system" Pod="goldmane-54d579b49d-rdxkn" WorkloadEndpoint="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"5ac35ace-3aab-4949-a692-f16bda148488", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"goldmane-54d579b49d-rdxkn", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.39.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicfe0cd5facc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:05.431931 env[1800]: 2025-09-13 00:06:05.324 [INFO][4614] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.131/32] ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Namespace="calico-system" Pod="goldmane-54d579b49d-rdxkn" WorkloadEndpoint="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:05.431931 env[1800]: 2025-09-13 00:06:05.324 [INFO][4614] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicfe0cd5facc ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Namespace="calico-system" Pod="goldmane-54d579b49d-rdxkn" WorkloadEndpoint="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:05.431931 env[1800]: 2025-09-13 00:06:05.357 [INFO][4614] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Namespace="calico-system" Pod="goldmane-54d579b49d-rdxkn" WorkloadEndpoint="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:05.431931 env[1800]: 2025-09-13 00:06:05.365 [INFO][4614] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Namespace="calico-system" Pod="goldmane-54d579b49d-rdxkn" WorkloadEndpoint="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"5ac35ace-3aab-4949-a692-f16bda148488", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b", Pod:"goldmane-54d579b49d-rdxkn", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.39.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicfe0cd5facc", MAC:"fa:c2:50:76:76:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:05.431931 env[1800]: 2025-09-13 00:06:05.401 [INFO][4614] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b" Namespace="calico-system" Pod="goldmane-54d579b49d-rdxkn" WorkloadEndpoint="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:06:05.465541 env[1800]: time="2025-09-13T00:06:05.465469510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:05.473779 env[1800]: time="2025-09-13T00:06:05.473727029Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker@sha256:e7113761fc7633d515882f0d48b5c8d0b8e62f3f9d34823f2ee194bb16d2ec44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:05.479381 env[1800]: time="2025-09-13T00:06:05.474981701Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.3\" returns image reference \"sha256:270a0129ec34c3ad6ae6d56c0afce111eb0baa25dfdacb63722ec5887bafd3c5\"" Sep 13 00:06:05.492294 env[1800]: time="2025-09-13T00:06:05.490590901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.497000 audit: BPF prog-id=165 op=LOAD Sep 13 00:06:05.497000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe5f36698 a2=98 a3=ffffe5f36688 items=0 ppid=4345 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.497000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:06:05.504000 audit: BPF prog-id=165 op=UNLOAD Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.504000 audit: BPF prog-id=166 op=LOAD Sep 13 00:06:05.504000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe5f36548 a2=74 a3=95 items=0 ppid=4345 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.504000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:06:05.506000 audit: BPF prog-id=166 op=UNLOAD Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.512988 env[1800]: time="2025-09-13T00:06:05.512931149Z" level=info msg="CreateContainer within sandbox \"884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed\" for container &ContainerMetadata{Name:whisker,Attempt:0,}" Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.506000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:05.506000 audit: BPF prog-id=167 op=LOAD Sep 13 00:06:05.506000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe5f36578 a2=40 a3=ffffe5f365a8 items=0 ppid=4345 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.506000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:06:05.513000 audit: BPF prog-id=167 op=UNLOAD Sep 13 00:06:05.565906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3233373475.mount: Deactivated successfully. Sep 13 00:06:05.567301 systemd-networkd[1518]: cali6359d8ef051: Gained IPv6LL Sep 13 00:06:05.581000 audit[4633]: USER_ACCT pid=4633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:05.584000 audit[4633]: CRED_ACQ pid=4633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:05.584000 audit[4633]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbf513c0 a2=3 a3=1 items=0 ppid=1 pid=4633 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:05.584000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:05.587161 sshd[4633]: Accepted publickey for core from 139.178.89.65 port 44894 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:05.586000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:05.586000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009b21e0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:06:05.586000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:06:05.587000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:05.587000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009b2220 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:06:05.587000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:06:05.588000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:05.588000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009b2240 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:06:05.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:06:05.593910 sshd[4633]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:05.594000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:05.594000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e7d5e0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:06:05.594000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:06:05.604655 systemd-logind[1793]: New session 8 of user core. Sep 13 00:06:05.610012 env[1800]: time="2025-09-13T00:06:05.598559310Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:05.610012 env[1800]: time="2025-09-13T00:06:05.598652230Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:05.610012 env[1800]: time="2025-09-13T00:06:05.598679888Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:05.610012 env[1800]: time="2025-09-13T00:06:05.599350642Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b pid=4698 runtime=io.containerd.runc.v2 Sep 13 00:06:05.605966 systemd[1]: Started session-8.scope. Sep 13 00:06:05.642258 env[1800]: time="2025-09-13T00:06:05.642177741Z" level=info msg="CreateContainer within sandbox \"884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed\" for &ContainerMetadata{Name:whisker,Attempt:0,} returns container id \"d3677023708fee2fc2397d675832945d8e113640a654c455788c8e26bcdcc03c\"" Sep 13 00:06:05.647000 audit[4633]: USER_START pid=4633 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:05.651357 env[1800]: time="2025-09-13T00:06:05.651234187Z" level=info msg="StartContainer for \"d3677023708fee2fc2397d675832945d8e113640a654c455788c8e26bcdcc03c\"" Sep 13 00:06:05.652000 audit[4718]: CRED_ACQ pid=4718 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:05.767488 systemd[1]: Started cri-containerd-8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b.scope. Sep 13 00:06:05.802803 systemd[1]: run-containerd-runc-k8s.io-8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b-runc.7eHMXs.mount: Deactivated successfully. Sep 13 00:06:05.980350 systemd[1]: Started cri-containerd-d3677023708fee2fc2397d675832945d8e113640a654c455788c8e26bcdcc03c.scope. Sep 13 00:06:06.161619 sshd[4633]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:06.163000 audit[4633]: USER_END pid=4633 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:06.164000 audit[4633]: CRED_DISP pid=4633 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:06.168203 systemd[1]: sshd@7-172.31.27.21:22-139.178.89.65:44894.service: Deactivated successfully. Sep 13 00:06:06.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.21:22-139.178.89.65:44894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:06.169598 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 00:06:06.172978 systemd-logind[1793]: Session 8 logged out. Waiting for processes to exit. Sep 13 00:06:06.177897 systemd-logind[1793]: Removed session 8. Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:05.947 [INFO][4673] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:05.947 [INFO][4673] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" iface="eth0" netns="/var/run/netns/cni-165a222f-8eb7-b1a9-e247-bcbcfb824067" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:05.947 [INFO][4673] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" iface="eth0" netns="/var/run/netns/cni-165a222f-8eb7-b1a9-e247-bcbcfb824067" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:05.954 [INFO][4673] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" iface="eth0" netns="/var/run/netns/cni-165a222f-8eb7-b1a9-e247-bcbcfb824067" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:05.954 [INFO][4673] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:05.954 [INFO][4673] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:06.186 [INFO][4761] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:06.187 [INFO][4761] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:06.187 [INFO][4761] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:06.210 [WARNING][4761] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:06.210 [INFO][4761] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:06.215 [INFO][4761] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:06.226991 env[1800]: 2025-09-13 00:06:06.221 [INFO][4673] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:06:06.231497 env[1800]: time="2025-09-13T00:06:06.231426085Z" level=info msg="TearDown network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\" successfully" Sep 13 00:06:06.231871 env[1800]: time="2025-09-13T00:06:06.231822855Z" level=info msg="StopPodSandbox for \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\" returns successfully" Sep 13 00:06:06.244436 env[1800]: time="2025-09-13T00:06:06.241678046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6764956d8d-gcsgl,Uid:b1e8d677-ddcc-4797-9a2b-15289c5f278d,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.295000 audit: BPF prog-id=168 op=LOAD Sep 13 00:06:06.297000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.297000 audit[4711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4698 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861616462633861623032373065373934373865383038626132316539 Sep 13 00:06:06.297000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.297000 audit[4711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4698 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861616462633861623032373065373934373865383038626132316539 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit: BPF prog-id=169 op=LOAD Sep 13 00:06:06.298000 audit[4711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4698 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861616462633861623032373065373934373865383038626132316539 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit: BPF prog-id=170 op=LOAD Sep 13 00:06:06.298000 audit[4711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4698 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861616462633861623032373065373934373865383038626132316539 Sep 13 00:06:06.298000 audit: BPF prog-id=170 op=UNLOAD Sep 13 00:06:06.298000 audit: BPF prog-id=169 op=UNLOAD Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { perfmon } for pid=4711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit[4711]: AVC avc: denied { bpf } for pid=4711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.298000 audit: BPF prog-id=171 op=LOAD Sep 13 00:06:06.298000 audit[4711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4698 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861616462633861623032373065373934373865383038626132316539 Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.152 [INFO][4685] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.152 [INFO][4685] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" iface="eth0" netns="/var/run/netns/cni-a54aa616-362e-89b1-e011-5914d364ba03" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.152 [INFO][4685] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" iface="eth0" netns="/var/run/netns/cni-a54aa616-362e-89b1-e011-5914d364ba03" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.153 [INFO][4685] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" iface="eth0" netns="/var/run/netns/cni-a54aa616-362e-89b1-e011-5914d364ba03" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.153 [INFO][4685] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.153 [INFO][4685] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.282 [INFO][4780] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.283 [INFO][4780] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.283 [INFO][4780] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.315 [WARNING][4780] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.315 [INFO][4780] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.321 [INFO][4780] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:06.332496 env[1800]: 2025-09-13 00:06:06.327 [INFO][4685] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:06:06.336617 env[1800]: time="2025-09-13T00:06:06.336498234Z" level=info msg="TearDown network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\" successfully" Sep 13 00:06:06.336852 env[1800]: time="2025-09-13T00:06:06.336814072Z" level=info msg="StopPodSandbox for \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\" returns successfully" Sep 13 00:06:06.344250 env[1800]: time="2025-09-13T00:06:06.344174756Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-kfggq,Uid:cb741d37-7d49-431e-9106-0f883bed0386,Namespace:kube-system,Attempt:1,}" Sep 13 00:06:06.418098 env[1800]: time="2025-09-13T00:06:06.418041791Z" level=info msg="StopPodSandbox for \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\"" Sep 13 00:06:06.422199 env[1800]: time="2025-09-13T00:06:06.418776081Z" level=info msg="StopPodSandbox for \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\"" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.077 [INFO][4674] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.085 [INFO][4674] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" iface="eth0" netns="/var/run/netns/cni-e4a5f1e1-479a-db5b-4666-f86770b90e5b" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.085 [INFO][4674] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" iface="eth0" netns="/var/run/netns/cni-e4a5f1e1-479a-db5b-4666-f86770b90e5b" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.086 [INFO][4674] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" iface="eth0" netns="/var/run/netns/cni-e4a5f1e1-479a-db5b-4666-f86770b90e5b" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.086 [INFO][4674] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.086 [INFO][4674] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.419 [INFO][4772] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.422 [INFO][4772] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.441 [INFO][4772] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.478 [WARNING][4772] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.478 [INFO][4772] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.488 [INFO][4772] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:06.526910 env[1800]: 2025-09-13 00:06:06.491 [INFO][4674] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:06:06.526910 env[1800]: time="2025-09-13T00:06:06.523676105Z" level=info msg="TearDown network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" successfully" Sep 13 00:06:06.526910 env[1800]: time="2025-09-13T00:06:06.523722577Z" level=info msg="StopPodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" returns successfully" Sep 13 00:06:06.528065 env[1800]: time="2025-09-13T00:06:06.527341580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f8688475b-gfns6,Uid:a8be4b28-8b5c-4ca5-b13d-63f217abdcee,Namespace:calico-apiserver,Attempt:1,}" Sep 13 00:06:06.562219 systemd[1]: run-netns-cni\x2d165a222f\x2d8eb7\x2db1a9\x2de247\x2dbcbcfb824067.mount: Deactivated successfully. Sep 13 00:06:06.562412 systemd[1]: run-netns-cni\x2de4a5f1e1\x2d479a\x2ddb5b\x2d4666\x2df86770b90e5b.mount: Deactivated successfully. Sep 13 00:06:06.562582 systemd[1]: run-netns-cni\x2da54aa616\x2d362e\x2d89b1\x2de011\x2d5914d364ba03.mount: Deactivated successfully. Sep 13 00:06:06.625374 systemd-networkd[1518]: vxlan.calico: Link UP Sep 13 00:06:06.625394 systemd-networkd[1518]: vxlan.calico: Gained carrier Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.687000 audit: BPF prog-id=172 op=LOAD Sep 13 00:06:06.690000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.690000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4372 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363737303233373038666565326663323339376436373538333239 Sep 13 00:06:06.691000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.691000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4372 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363737303233373038666565326663323339376436373538333239 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.692000 audit: BPF prog-id=173 op=LOAD Sep 13 00:06:06.692000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4372 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363737303233373038666565326663323339376436373538333239 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.694000 audit: BPF prog-id=174 op=LOAD Sep 13 00:06:06.694000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4372 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363737303233373038666565326663323339376436373538333239 Sep 13 00:06:06.696000 audit: BPF prog-id=174 op=UNLOAD Sep 13 00:06:06.697000 audit: BPF prog-id=173 op=UNLOAD Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { perfmon } for pid=4750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit[4750]: AVC avc: denied { bpf } for pid=4750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.697000 audit: BPF prog-id=175 op=LOAD Sep 13 00:06:06.697000 audit[4750]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4372 pid=4750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433363737303233373038666565326663323339376436373538333239 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit: BPF prog-id=176 op=LOAD Sep 13 00:06:06.975000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbfb4e08 a2=98 a3=ffffcbfb4df8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.975000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.975000 audit: BPF prog-id=176 op=UNLOAD Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.968164 (udev-worker)[4177]: Network interface NamePolicy= disabled on kernel command line. Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.975000 audit: BPF prog-id=177 op=LOAD Sep 13 00:06:06.975000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbfb4ae8 a2=74 a3=95 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.975000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit: BPF prog-id=177 op=UNLOAD Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit: BPF prog-id=178 op=LOAD Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcbfb4b48 a2=94 a3=2 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit: BPF prog-id=178 op=UNLOAD Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbfb4b78 a2=28 a3=ffffcbfb4ca8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbfb4ba8 a2=28 a3=ffffcbfb4cd8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbfb4a58 a2=28 a3=ffffcbfb4b88 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbfb4bc8 a2=28 a3=ffffcbfb4cf8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbfb4ba8 a2=28 a3=ffffcbfb4cd8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbfb4b98 a2=28 a3=ffffcbfb4cc8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbfb4bc8 a2=28 a3=ffffcbfb4cf8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbfb4ba8 a2=28 a3=ffffcbfb4cd8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.987000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.987000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbfb4bc8 a2=28 a3=ffffcbfb4cf8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.987000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcbfb4b98 a2=28 a3=ffffcbfb4cc8 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.988000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcbfb4c18 a2=28 a3=ffffcbfb4d58 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.988000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.988000 audit: BPF prog-id=179 op=LOAD Sep 13 00:06:06.988000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbfb4a38 a2=40 a3=ffffcbfb4a68 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.988000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:06.988000 audit: BPF prog-id=179 op=UNLOAD Sep 13 00:06:06.989000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:06.989000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcbfb4a60 a2=50 a3=0 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:06.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcbfb4a60 a2=50 a3=0 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.016000 audit: BPF prog-id=180 op=LOAD Sep 13 00:06:07.016000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbfb41c8 a2=94 a3=2 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:07.017000 audit: BPF prog-id=180 op=UNLOAD Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.017000 audit: BPF prog-id=181 op=LOAD Sep 13 00:06:07.017000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcbfb4358 a2=94 a3=30 items=0 ppid=4345 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.017000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.046000 audit: BPF prog-id=182 op=LOAD Sep 13 00:06:07.046000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0254158 a2=98 a3=ffffc0254148 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.046000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:07.050000 audit: BPF prog-id=182 op=UNLOAD Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.053000 audit: BPF prog-id=183 op=LOAD Sep 13 00:06:07.053000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc0253de8 a2=74 a3=95 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.053000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:07.057000 audit: BPF prog-id=183 op=UNLOAD Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.057000 audit: BPF prog-id=184 op=LOAD Sep 13 00:06:07.057000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc0253e48 a2=94 a3=2 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.057000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:07.057000 audit: BPF prog-id=184 op=UNLOAD Sep 13 00:06:07.110946 env[1800]: time="2025-09-13T00:06:07.110780530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-54d579b49d-rdxkn,Uid:5ac35ace-3aab-4949-a692-f16bda148488,Namespace:calico-system,Attempt:1,} returns sandbox id \"8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b\"" Sep 13 00:06:07.275452 systemd-networkd[1518]: cali448c2bc8c41: Link UP Sep 13 00:06:07.292661 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali448c2bc8c41: link becomes ready Sep 13 00:06:07.292373 systemd-networkd[1518]: cali448c2bc8c41: Gained carrier Sep 13 00:06:07.304392 env[1800]: time="2025-09-13T00:06:07.302824964Z" level=info msg="StartContainer for \"d3677023708fee2fc2397d675832945d8e113640a654c455788c8e26bcdcc03c\" returns successfully" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:06.466 [INFO][4791] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0 calico-apiserver-6764956d8d- calico-apiserver b1e8d677-ddcc-4797-9a2b-15289c5f278d 1062 0 2025-09-13 00:05:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6764956d8d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-21 calico-apiserver-6764956d8d-gcsgl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali448c2bc8c41 [] [] }} ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Namespace="calico-apiserver" Pod="calico-apiserver-6764956d8d-gcsgl" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:06.466 [INFO][4791] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Namespace="calico-apiserver" Pod="calico-apiserver-6764956d8d-gcsgl" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.072 [INFO][4835] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" HandleID="k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.072 [INFO][4835] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" HandleID="k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c3f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-21", "pod":"calico-apiserver-6764956d8d-gcsgl", "timestamp":"2025-09-13 00:06:07.072475051 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.072 [INFO][4835] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.073 [INFO][4835] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.073 [INFO][4835] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.099 [INFO][4835] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.131 [INFO][4835] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.142 [INFO][4835] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.151 [INFO][4835] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.163 [INFO][4835] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.164 [INFO][4835] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.175 [INFO][4835] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32 Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.185 [INFO][4835] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.226 [INFO][4835] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.132/26] block=192.168.39.128/26 handle="k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.226 [INFO][4835] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.132/26] handle="k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" host="ip-172-31-27-21" Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.226 [INFO][4835] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:07.344591 env[1800]: 2025-09-13 00:06:07.226 [INFO][4835] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.132/26] IPv6=[] ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" HandleID="k8s-pod-network.4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:07.345992 env[1800]: 2025-09-13 00:06:07.255 [INFO][4791] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Namespace="calico-apiserver" Pod="calico-apiserver-6764956d8d-gcsgl" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0", GenerateName:"calico-apiserver-6764956d8d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b1e8d677-ddcc-4797-9a2b-15289c5f278d", ResourceVersion:"1062", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6764956d8d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"calico-apiserver-6764956d8d-gcsgl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali448c2bc8c41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:07.345992 env[1800]: 2025-09-13 00:06:07.256 [INFO][4791] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.132/32] ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Namespace="calico-apiserver" Pod="calico-apiserver-6764956d8d-gcsgl" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:07.345992 env[1800]: 2025-09-13 00:06:07.256 [INFO][4791] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali448c2bc8c41 ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Namespace="calico-apiserver" Pod="calico-apiserver-6764956d8d-gcsgl" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:07.345992 env[1800]: 2025-09-13 00:06:07.297 [INFO][4791] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Namespace="calico-apiserver" Pod="calico-apiserver-6764956d8d-gcsgl" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:07.345992 env[1800]: 2025-09-13 00:06:07.299 [INFO][4791] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Namespace="calico-apiserver" Pod="calico-apiserver-6764956d8d-gcsgl" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0", GenerateName:"calico-apiserver-6764956d8d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b1e8d677-ddcc-4797-9a2b-15289c5f278d", ResourceVersion:"1062", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6764956d8d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32", Pod:"calico-apiserver-6764956d8d-gcsgl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali448c2bc8c41", MAC:"76:26:8c:01:ed:9a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:07.345992 env[1800]: 2025-09-13 00:06:07.335 [INFO][4791] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32" Namespace="calico-apiserver" Pod="calico-apiserver-6764956d8d-gcsgl" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:06:07.359042 systemd-networkd[1518]: calicfe0cd5facc: Gained IPv6LL Sep 13 00:06:07.430000 audit[4788]: AVC avc: denied { search } for pid=4788 comm="nginx" name="crypto" dev="proc" ino=23356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c657 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:06:07.430000 audit[4788]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9d14e958 a2=0 a3=0 items=0 ppid=4372 pid=4788 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="nginx" exe="/usr/sbin/nginx" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c657 key=(null) Sep 13 00:06:07.430000 audit: PROCTITLE proctitle=2F7573722F7362696E2F6E67696E78002D67006461656D6F6E206F66663B Sep 13 00:06:07.459278 env[1800]: time="2025-09-13T00:06:07.459019169Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:07.459278 env[1800]: time="2025-09-13T00:06:07.459163134Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:07.463498 env[1800]: time="2025-09-13T00:06:07.459259486Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:07.463498 env[1800]: time="2025-09-13T00:06:07.459680039Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32 pid=4948 runtime=io.containerd.runc.v2 Sep 13 00:06:07.566896 systemd-networkd[1518]: calia87bab4ca93: Link UP Sep 13 00:06:07.574696 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia87bab4ca93: link becomes ready Sep 13 00:06:07.576720 systemd-networkd[1518]: calia87bab4ca93: Gained carrier Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:06.908 [INFO][4846] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:06.909 [INFO][4846] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" iface="eth0" netns="/var/run/netns/cni-1431d1a4-19dc-bc43-ff8f-ecc2eed5db15" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:06.912 [INFO][4846] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" iface="eth0" netns="/var/run/netns/cni-1431d1a4-19dc-bc43-ff8f-ecc2eed5db15" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:06.912 [INFO][4846] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" iface="eth0" netns="/var/run/netns/cni-1431d1a4-19dc-bc43-ff8f-ecc2eed5db15" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:06.912 [INFO][4846] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:06.912 [INFO][4846] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:07.378 [INFO][4889] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:07.379 [INFO][4889] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:07.542 [INFO][4889] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:07.588 [WARNING][4889] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:07.589 [INFO][4889] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:07.597 [INFO][4889] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:07.621180 env[1800]: 2025-09-13 00:06:07.600 [INFO][4846] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:06:07.626256 systemd[1]: run-netns-cni\x2d1431d1a4\x2d19dc\x2dbc43\x2dff8f\x2decc2eed5db15.mount: Deactivated successfully. Sep 13 00:06:07.638260 env[1800]: time="2025-09-13T00:06:07.628694749Z" level=info msg="TearDown network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\" successfully" Sep 13 00:06:07.638260 env[1800]: time="2025-09-13T00:06:07.628789134Z" level=info msg="StopPodSandbox for \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\" returns successfully" Sep 13 00:06:07.639354 env[1800]: time="2025-09-13T00:06:07.639294572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tbpg,Uid:0a1b1282-a990-45e1-9198-e7947e011e69,Namespace:calico-system,Attempt:1,}" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:06.747 [INFO][4810] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0 coredns-674b8bbfcf- kube-system cb741d37-7d49-431e-9106-0f883bed0386 1066 0 2025-09-13 00:05:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-21 coredns-674b8bbfcf-kfggq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia87bab4ca93 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Namespace="kube-system" Pod="coredns-674b8bbfcf-kfggq" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:06.747 [INFO][4810] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Namespace="kube-system" Pod="coredns-674b8bbfcf-kfggq" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.358 [INFO][4872] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" HandleID="k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.358 [INFO][4872] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" HandleID="k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000222d30), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-21", "pod":"coredns-674b8bbfcf-kfggq", "timestamp":"2025-09-13 00:06:07.357957984 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.358 [INFO][4872] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.360 [INFO][4872] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.365 [INFO][4872] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.413 [INFO][4872] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.458 [INFO][4872] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.470 [INFO][4872] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.474 [INFO][4872] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.485 [INFO][4872] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.485 [INFO][4872] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.503 [INFO][4872] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997 Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.521 [INFO][4872] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.541 [INFO][4872] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.133/26] block=192.168.39.128/26 handle="k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.541 [INFO][4872] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.133/26] handle="k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" host="ip-172-31-27-21" Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.541 [INFO][4872] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:07.646698 env[1800]: 2025-09-13 00:06:07.541 [INFO][4872] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.133/26] IPv6=[] ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" HandleID="k8s-pod-network.9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:07.648073 env[1800]: 2025-09-13 00:06:07.546 [INFO][4810] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Namespace="kube-system" Pod="coredns-674b8bbfcf-kfggq" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"cb741d37-7d49-431e-9106-0f883bed0386", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"coredns-674b8bbfcf-kfggq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.39.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia87bab4ca93", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:07.648073 env[1800]: 2025-09-13 00:06:07.546 [INFO][4810] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.133/32] ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Namespace="kube-system" Pod="coredns-674b8bbfcf-kfggq" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:07.648073 env[1800]: 2025-09-13 00:06:07.546 [INFO][4810] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia87bab4ca93 ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Namespace="kube-system" Pod="coredns-674b8bbfcf-kfggq" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:07.648073 env[1800]: 2025-09-13 00:06:07.579 [INFO][4810] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Namespace="kube-system" Pod="coredns-674b8bbfcf-kfggq" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:07.648073 env[1800]: 2025-09-13 00:06:07.580 [INFO][4810] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Namespace="kube-system" Pod="coredns-674b8bbfcf-kfggq" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"cb741d37-7d49-431e-9106-0f883bed0386", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997", Pod:"coredns-674b8bbfcf-kfggq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.39.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia87bab4ca93", MAC:"f6:dc:4b:c3:46:1b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:07.648073 env[1800]: 2025-09-13 00:06:07.613 [INFO][4810] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997" Namespace="kube-system" Pod="coredns-674b8bbfcf-kfggq" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:06:07.661431 systemd[1]: Started cri-containerd-4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32.scope. Sep 13 00:06:07.685160 systemd[1]: run-containerd-runc-k8s.io-4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32-runc.xDZPT6.mount: Deactivated successfully. Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.308 [INFO][4847] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.313 [INFO][4847] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" iface="eth0" netns="/var/run/netns/cni-5dff1b6b-15da-bd5b-d30f-70cee139ff5c" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.314 [INFO][4847] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" iface="eth0" netns="/var/run/netns/cni-5dff1b6b-15da-bd5b-d30f-70cee139ff5c" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.315 [INFO][4847] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" iface="eth0" netns="/var/run/netns/cni-5dff1b6b-15da-bd5b-d30f-70cee139ff5c" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.315 [INFO][4847] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.315 [INFO][4847] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.596 [INFO][4922] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.607 [INFO][4922] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.607 [INFO][4922] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.652 [WARNING][4922] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.652 [INFO][4922] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.676 [INFO][4922] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:07.702199 env[1800]: 2025-09-13 00:06:07.691 [INFO][4847] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:06:07.707094 systemd[1]: run-netns-cni\x2d5dff1b6b\x2d15da\x2dbd5b\x2dd30f\x2d70cee139ff5c.mount: Deactivated successfully. Sep 13 00:06:07.712930 env[1800]: time="2025-09-13T00:06:07.712807277Z" level=info msg="TearDown network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\" successfully" Sep 13 00:06:07.712930 env[1800]: time="2025-09-13T00:06:07.712897521Z" level=info msg="StopPodSandbox for \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\" returns successfully" Sep 13 00:06:07.714099 env[1800]: time="2025-09-13T00:06:07.714038568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d596d8c-6g75b,Uid:e649b2a4-e3e6-4707-952b-39cddc6671e5,Namespace:calico-system,Attempt:1,}" Sep 13 00:06:07.852818 kernel: kauditd_printk_skb: 666 callbacks suppressed Sep 13 00:06:07.853002 kernel: audit: type=1400 audit(1757721967.841:1219): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.868656 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 00:06:07.868776 kernel: audit: type=1400 audit(1757721967.841:1220): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.868843 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.881839 kernel: audit: type=1400 audit(1757721967.841:1221): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.898886 kernel: audit: type=1400 audit(1757721967.841:1222): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.899037 kernel: audit: backlog limit exceeded Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.915195 kernel: audit: type=1400 audit(1757721967.841:1223): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.929083 kernel: audit: type=1400 audit(1757721967.841:1224): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.944553 kernel: audit: type=1400 audit(1757721967.841:1225): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.945114 env[1800]: time="2025-09-13T00:06:07.933885694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:07.945114 env[1800]: time="2025-09-13T00:06:07.933953116Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:07.945114 env[1800]: time="2025-09-13T00:06:07.933979478Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:07.945114 env[1800]: time="2025-09-13T00:06:07.934285357Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997 pid=5001 runtime=io.containerd.runc.v2 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.841000 audit: BPF prog-id=185 op=LOAD Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4948 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464386237643832393761356363343863663637346634303430316135 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4948 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464386237643832393761356363343863663637346634303430316135 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.842000 audit: BPF prog-id=186 op=LOAD Sep 13 00:06:07.842000 audit[4958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4948 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464386237643832393761356363343863663637346634303430316135 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.850000 audit: BPF prog-id=187 op=LOAD Sep 13 00:06:07.850000 audit[4958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4948 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464386237643832393761356363343863663637346634303430316135 Sep 13 00:06:07.851000 audit: BPF prog-id=187 op=UNLOAD Sep 13 00:06:07.851000 audit: BPF prog-id=186 op=UNLOAD Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { perfmon } for pid=4958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit[4958]: AVC avc: denied { bpf } for pid=4958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.851000 audit: BPF prog-id=188 op=LOAD Sep 13 00:06:07.851000 audit[4958]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4948 pid=4958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464386237643832393761356363343863663637346634303430316135 Sep 13 00:06:07.857000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.857000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.857000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.857000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.857000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.857000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.857000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.857000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.857000 audit: BPF prog-id=189 op=LOAD Sep 13 00:06:07.857000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc0253e08 a2=40 a3=ffffc0253e38 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.857000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:07.953000 audit: BPF prog-id=189 op=UNLOAD Sep 13 00:06:07.953000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:07.953000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc0253f20 a2=50 a3=0 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:07.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.006406 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:06:08.006551 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5e60fccd889: link becomes ready Sep 13 00:06:08.006757 systemd-networkd[1518]: cali5e60fccd889: Link UP Sep 13 00:06:08.007217 systemd-networkd[1518]: cali5e60fccd889: Gained carrier Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.212 [INFO][4858] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0 calico-apiserver-f8688475b- calico-apiserver a8be4b28-8b5c-4ca5-b13d-63f217abdcee 1064 0 2025-09-13 00:05:27 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:f8688475b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-21 calico-apiserver-f8688475b-gfns6 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5e60fccd889 [] [] }} ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-gfns6" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.212 [INFO][4858] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-gfns6" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.606 [INFO][4920] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.606 [INFO][4920] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400032f950), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-21", "pod":"calico-apiserver-f8688475b-gfns6", "timestamp":"2025-09-13 00:06:07.606574743 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.610 [INFO][4920] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.683 [INFO][4920] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.683 [INFO][4920] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.782 [INFO][4920] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.798 [INFO][4920] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.823 [INFO][4920] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.832 [INFO][4920] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.862 [INFO][4920] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.862 [INFO][4920] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.874 [INFO][4920] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.902 [INFO][4920] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.963 [INFO][4920] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.134/26] block=192.168.39.128/26 handle="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.963 [INFO][4920] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.134/26] handle="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" host="ip-172-31-27-21" Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.963 [INFO][4920] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:08.076083 env[1800]: 2025-09-13 00:06:07.963 [INFO][4920] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.134/26] IPv6=[] ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:08.077375 env[1800]: 2025-09-13 00:06:07.974 [INFO][4858] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-gfns6" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0", GenerateName:"calico-apiserver-f8688475b-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8be4b28-8b5c-4ca5-b13d-63f217abdcee", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f8688475b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"calico-apiserver-f8688475b-gfns6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5e60fccd889", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:08.077375 env[1800]: 2025-09-13 00:06:07.974 [INFO][4858] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.134/32] ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-gfns6" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:08.077375 env[1800]: 2025-09-13 00:06:07.974 [INFO][4858] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5e60fccd889 ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-gfns6" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:08.077375 env[1800]: 2025-09-13 00:06:08.025 [INFO][4858] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-gfns6" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:08.077375 env[1800]: 2025-09-13 00:06:08.025 [INFO][4858] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-gfns6" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0", GenerateName:"calico-apiserver-f8688475b-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8be4b28-8b5c-4ca5-b13d-63f217abdcee", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f8688475b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda", Pod:"calico-apiserver-f8688475b-gfns6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5e60fccd889", MAC:"ee:f7:d1:15:ba:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:08.077375 env[1800]: 2025-09-13 00:06:08.069 [INFO][4858] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Namespace="calico-apiserver" Pod="calico-apiserver-f8688475b-gfns6" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:08.079000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.079000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0253e78 a2=28 a3=ffffc0253fa8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.079000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.088000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.088000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0253ea8 a2=28 a3=ffffc0253fd8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.088000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.088000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.088000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0253d58 a2=28 a3=ffffc0253e88 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.088000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.088000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.088000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0253ec8 a2=28 a3=ffffc0253ff8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.088000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.088000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.088000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0253ea8 a2=28 a3=ffffc0253fd8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.088000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.088000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.088000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0253e98 a2=28 a3=ffffc0253fc8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.088000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.090000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.090000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0253ec8 a2=28 a3=ffffc0253ff8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.090000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.090000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.090000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0253ea8 a2=28 a3=ffffc0253fd8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.090000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.090000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.090000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0253ec8 a2=28 a3=ffffc0253ff8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.090000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.090000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.090000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc0253e98 a2=28 a3=ffffc0253fc8 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.090000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc0253f18 a2=28 a3=ffffc0254058 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.091000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc0253c50 a2=50 a3=0 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.091000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit: BPF prog-id=190 op=LOAD Sep 13 00:06:08.091000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc0253c58 a2=94 a3=5 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.091000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.091000 audit: BPF prog-id=190 op=UNLOAD Sep 13 00:06:08.091000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.091000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc0253d60 a2=50 a3=0 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.091000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc0253ea8 a2=4 a3=3 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.125618 systemd[1]: Started cri-containerd-9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997.scope. Sep 13 00:06:08.096000 audit[4903]: AVC avc: denied { confidentiality } for pid=4903 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:08.096000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc0253e88 a2=94 a3=6 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.096000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.167000 audit[4903]: AVC avc: denied { confidentiality } for pid=4903 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:08.167000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc0253658 a2=94 a3=83 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.167000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.180000 audit[4903]: AVC avc: denied { confidentiality } for pid=4903 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:06:08.180000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc0253658 a2=94 a3=83 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.180000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.187000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.187000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc0255098 a2=10 a3=ffffc0255188 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.188000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.188000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc0254f58 a2=10 a3=ffffc0255048 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.188000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.188000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc0254ec8 a2=10 a3=ffffc0255048 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.188000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.188000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc0254ec8 a2=10 a3=ffffc0255048 items=0 ppid=4345 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:06:08.192271 systemd-networkd[1518]: vxlan.calico: Gained IPv6LL Sep 13 00:06:08.260587 env[1800]: time="2025-09-13T00:06:08.260469858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6764956d8d-gcsgl,Uid:b1e8d677-ddcc-4797-9a2b-15289c5f278d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32\"" Sep 13 00:06:08.276234 env[1800]: time="2025-09-13T00:06:08.274092897Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:08.276234 env[1800]: time="2025-09-13T00:06:08.274324863Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:08.276567 env[1800]: time="2025-09-13T00:06:08.274352497Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:08.278099 env[1800]: time="2025-09-13T00:06:08.277986754Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda pid=5052 runtime=io.containerd.runc.v2 Sep 13 00:06:08.327000 audit: BPF prog-id=181 op=UNLOAD Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.351000 audit: BPF prog-id=191 op=LOAD Sep 13 00:06:08.354000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.354000 audit[5014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5001 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343062636537383965393737656337393836333936653435323333 Sep 13 00:06:08.356000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.356000 audit[5014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5001 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343062636537383965393737656337393836333936653435323333 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.357000 audit: BPF prog-id=192 op=LOAD Sep 13 00:06:08.357000 audit[5014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5001 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343062636537383965393737656337393836333936653435323333 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.365000 audit: BPF prog-id=193 op=LOAD Sep 13 00:06:08.365000 audit[5014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5001 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343062636537383965393737656337393836333936653435323333 Sep 13 00:06:08.366000 audit: BPF prog-id=193 op=UNLOAD Sep 13 00:06:08.366000 audit: BPF prog-id=192 op=UNLOAD Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { perfmon } for pid=5014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit[5014]: AVC avc: denied { bpf } for pid=5014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.366000 audit: BPF prog-id=194 op=LOAD Sep 13 00:06:08.366000 audit[5014]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5001 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343062636537383965393737656337393836333936653435323333 Sep 13 00:06:08.374197 systemd[1]: Started cri-containerd-0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda.scope. Sep 13 00:06:08.418055 env[1800]: time="2025-09-13T00:06:08.413707006Z" level=info msg="StopPodSandbox for \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\"" Sep 13 00:06:08.669486 env[1800]: time="2025-09-13T00:06:08.668747112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-kfggq,Uid:cb741d37-7d49-431e-9106-0f883bed0386,Namespace:kube-system,Attempt:1,} returns sandbox id \"9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997\"" Sep 13 00:06:08.682681 env[1800]: time="2025-09-13T00:06:08.682589422Z" level=info msg="CreateContainer within sandbox \"9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:06:08.704153 systemd-networkd[1518]: calia87bab4ca93: Gained IPv6LL Sep 13 00:06:08.740459 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia65782482fe: link becomes ready Sep 13 00:06:08.740018 systemd-networkd[1518]: calia65782482fe: Link UP Sep 13 00:06:08.740542 systemd-networkd[1518]: calia65782482fe: Gained carrier Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.754000 audit: BPF prog-id=195 op=LOAD Sep 13 00:06:08.762000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.762000 audit[5079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=5052 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623964366139356130363563633334366666303832626632313931 Sep 13 00:06:08.762000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.762000 audit[5079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=5052 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623964366139356130363563633334366666303832626632313931 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit: BPF prog-id=196 op=LOAD Sep 13 00:06:08.763000 audit[5079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=5052 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623964366139356130363563633334366666303832626632313931 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.763000 audit: BPF prog-id=197 op=LOAD Sep 13 00:06:08.763000 audit[5079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=5052 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623964366139356130363563633334366666303832626632313931 Sep 13 00:06:08.763000 audit: BPF prog-id=197 op=UNLOAD Sep 13 00:06:08.763000 audit: BPF prog-id=196 op=UNLOAD Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { perfmon } for pid=5079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit[5079]: AVC avc: denied { bpf } for pid=5079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:08.764000 audit: BPF prog-id=198 op=LOAD Sep 13 00:06:08.764000 audit[5079]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=5052 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:08.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061623964366139356130363563633334366666303832626632313931 Sep 13 00:06:08.770108 systemd-networkd[1518]: cali448c2bc8c41: Gained IPv6LL Sep 13 00:06:08.802359 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1658290927.mount: Deactivated successfully. Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.223 [INFO][4985] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0 csi-node-driver- calico-system 0a1b1282-a990-45e1-9198-e7947e011e69 1070 0 2025-09-13 00:05:39 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-27-21 csi-node-driver-6tbpg eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calia65782482fe [] [] }} ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Namespace="calico-system" Pod="csi-node-driver-6tbpg" WorkloadEndpoint="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.224 [INFO][4985] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Namespace="calico-system" Pod="csi-node-driver-6tbpg" WorkloadEndpoint="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.479 [INFO][5067] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" HandleID="k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.484 [INFO][5067] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" HandleID="k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004da10), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-21", "pod":"csi-node-driver-6tbpg", "timestamp":"2025-09-13 00:06:08.479057286 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.484 [INFO][5067] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.485 [INFO][5067] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.485 [INFO][5067] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.522 [INFO][5067] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.556 [INFO][5067] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.579 [INFO][5067] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.603 [INFO][5067] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.612 [INFO][5067] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.613 [INFO][5067] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.638 [INFO][5067] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926 Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.673 [INFO][5067] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.691 [INFO][5067] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.135/26] block=192.168.39.128/26 handle="k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.691 [INFO][5067] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.135/26] handle="k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" host="ip-172-31-27-21" Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.691 [INFO][5067] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:08.817649 env[1800]: 2025-09-13 00:06:08.691 [INFO][5067] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.135/26] IPv6=[] ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" HandleID="k8s-pod-network.826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:08.819023 env[1800]: 2025-09-13 00:06:08.703 [INFO][4985] cni-plugin/k8s.go 418: Populated endpoint ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Namespace="calico-system" Pod="csi-node-driver-6tbpg" WorkloadEndpoint="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a1b1282-a990-45e1-9198-e7947e011e69", ResourceVersion:"1070", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"csi-node-driver-6tbpg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.39.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia65782482fe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:08.819023 env[1800]: 2025-09-13 00:06:08.704 [INFO][4985] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.135/32] ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Namespace="calico-system" Pod="csi-node-driver-6tbpg" WorkloadEndpoint="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:08.819023 env[1800]: 2025-09-13 00:06:08.704 [INFO][4985] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia65782482fe ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Namespace="calico-system" Pod="csi-node-driver-6tbpg" WorkloadEndpoint="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:08.819023 env[1800]: 2025-09-13 00:06:08.743 [INFO][4985] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Namespace="calico-system" Pod="csi-node-driver-6tbpg" WorkloadEndpoint="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:08.819023 env[1800]: 2025-09-13 00:06:08.744 [INFO][4985] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Namespace="calico-system" Pod="csi-node-driver-6tbpg" WorkloadEndpoint="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a1b1282-a990-45e1-9198-e7947e011e69", ResourceVersion:"1070", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926", Pod:"csi-node-driver-6tbpg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.39.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia65782482fe", MAC:"a2:67:19:74:6f:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:08.819023 env[1800]: 2025-09-13 00:06:08.779 [INFO][4985] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926" Namespace="calico-system" Pod="csi-node-driver-6tbpg" WorkloadEndpoint="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:06:08.825476 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2694144902.mount: Deactivated successfully. Sep 13 00:06:08.838324 env[1800]: time="2025-09-13T00:06:08.838240056Z" level=info msg="CreateContainer within sandbox \"9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1b74fbb3ce6b52419fa84c6dd183c974f6d11666a44a0d674f919a023658b554\"" Sep 13 00:06:08.839536 env[1800]: time="2025-09-13T00:06:08.839453339Z" level=info msg="StartContainer for \"1b74fbb3ce6b52419fa84c6dd183c974f6d11666a44a0d674f919a023658b554\"" Sep 13 00:06:08.924561 env[1800]: time="2025-09-13T00:06:08.919921043Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:08.924561 env[1800]: time="2025-09-13T00:06:08.920004869Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:08.924561 env[1800]: time="2025-09-13T00:06:08.920031135Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:08.925293 env[1800]: time="2025-09-13T00:06:08.925127715Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926 pid=5168 runtime=io.containerd.runc.v2 Sep 13 00:06:08.945315 systemd-networkd[1518]: califd23ec105c7: Link UP Sep 13 00:06:08.954606 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califd23ec105c7: link becomes ready Sep 13 00:06:08.956862 systemd-networkd[1518]: califd23ec105c7: Gained carrier Sep 13 00:06:08.968415 systemd[1]: Started cri-containerd-1b74fbb3ce6b52419fa84c6dd183c974f6d11666a44a0d674f919a023658b554.scope. Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.317 [INFO][4998] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0 calico-kube-controllers-68d596d8c- calico-system e649b2a4-e3e6-4707-952b-39cddc6671e5 1077 0 2025-09-13 00:05:40 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:68d596d8c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-27-21 calico-kube-controllers-68d596d8c-6g75b eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califd23ec105c7 [] [] }} ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Namespace="calico-system" Pod="calico-kube-controllers-68d596d8c-6g75b" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.317 [INFO][4998] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Namespace="calico-system" Pod="calico-kube-controllers-68d596d8c-6g75b" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.613 [INFO][5093] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" HandleID="k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.615 [INFO][5093] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" HandleID="k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d37d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-21", "pod":"calico-kube-controllers-68d596d8c-6g75b", "timestamp":"2025-09-13 00:06:08.613432013 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.616 [INFO][5093] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.691 [INFO][5093] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.691 [INFO][5093] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.729 [INFO][5093] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.778 [INFO][5093] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.817 [INFO][5093] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.832 [INFO][5093] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.838 [INFO][5093] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.839 [INFO][5093] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.852 [INFO][5093] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00 Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.875 [INFO][5093] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.903 [INFO][5093] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.136/26] block=192.168.39.128/26 handle="k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.904 [INFO][5093] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.136/26] handle="k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" host="ip-172-31-27-21" Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.904 [INFO][5093] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:09.025665 env[1800]: 2025-09-13 00:06:08.904 [INFO][5093] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.136/26] IPv6=[] ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" HandleID="k8s-pod-network.27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:09.027074 env[1800]: 2025-09-13 00:06:08.941 [INFO][4998] cni-plugin/k8s.go 418: Populated endpoint ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Namespace="calico-system" Pod="calico-kube-controllers-68d596d8c-6g75b" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0", GenerateName:"calico-kube-controllers-68d596d8c-", Namespace:"calico-system", SelfLink:"", UID:"e649b2a4-e3e6-4707-952b-39cddc6671e5", ResourceVersion:"1077", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d596d8c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"calico-kube-controllers-68d596d8c-6g75b", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.39.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califd23ec105c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:09.027074 env[1800]: 2025-09-13 00:06:08.942 [INFO][4998] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.136/32] ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Namespace="calico-system" Pod="calico-kube-controllers-68d596d8c-6g75b" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:09.027074 env[1800]: 2025-09-13 00:06:08.942 [INFO][4998] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califd23ec105c7 ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Namespace="calico-system" Pod="calico-kube-controllers-68d596d8c-6g75b" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:09.027074 env[1800]: 2025-09-13 00:06:08.970 [INFO][4998] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Namespace="calico-system" Pod="calico-kube-controllers-68d596d8c-6g75b" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:09.027074 env[1800]: 2025-09-13 00:06:08.973 [INFO][4998] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Namespace="calico-system" Pod="calico-kube-controllers-68d596d8c-6g75b" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0", GenerateName:"calico-kube-controllers-68d596d8c-", Namespace:"calico-system", SelfLink:"", UID:"e649b2a4-e3e6-4707-952b-39cddc6671e5", ResourceVersion:"1077", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d596d8c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00", Pod:"calico-kube-controllers-68d596d8c-6g75b", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.39.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califd23ec105c7", MAC:"0e:b6:fc:79:e7:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:09.027074 env[1800]: 2025-09-13 00:06:09.017 [INFO][4998] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00" Namespace="calico-system" Pod="calico-kube-controllers-68d596d8c-6g75b" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:06:09.089890 systemd[1]: Started cri-containerd-826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926.scope. Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.131000 audit: BPF prog-id=199 op=LOAD Sep 13 00:06:09.133000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.133000 audit[5169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5001 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373466626233636536623532343139666138346336646431383363 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5001 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373466626233636536623532343139666138346336646431383363 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit: BPF prog-id=200 op=LOAD Sep 13 00:06:09.134000 audit[5169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5001 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373466626233636536623532343139666138346336646431383363 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.134000 audit: BPF prog-id=201 op=LOAD Sep 13 00:06:09.134000 audit[5169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5001 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373466626233636536623532343139666138346336646431383363 Sep 13 00:06:09.134000 audit: BPF prog-id=201 op=UNLOAD Sep 13 00:06:09.139000 audit: BPF prog-id=200 op=UNLOAD Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { perfmon } for pid=5169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit[5169]: AVC avc: denied { bpf } for pid=5169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.139000 audit: BPF prog-id=202 op=LOAD Sep 13 00:06:09.139000 audit[5169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5001 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162373466626233636536623532343139666138346336646431383363 Sep 13 00:06:09.203181 env[1800]: time="2025-09-13T00:06:09.191938037Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:09.203181 env[1800]: time="2025-09-13T00:06:09.192013667Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:09.203181 env[1800]: time="2025-09-13T00:06:09.192039081Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:09.203181 env[1800]: time="2025-09-13T00:06:09.192293809Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00 pid=5230 runtime=io.containerd.runc.v2 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.212000 audit: BPF prog-id=203 op=LOAD Sep 13 00:06:09.216000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.216000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=5168 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832366164363236303835646161376234653735393764353639633866 Sep 13 00:06:09.217000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.217000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=5168 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832366164363236303835646161376234653735393764353639633866 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.218000 audit: BPF prog-id=204 op=LOAD Sep 13 00:06:09.218000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=5168 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832366164363236303835646161376234653735393764353639633866 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.221000 audit: BPF prog-id=205 op=LOAD Sep 13 00:06:09.221000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=5168 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832366164363236303835646161376234653735393764353639633866 Sep 13 00:06:09.222000 audit: BPF prog-id=205 op=UNLOAD Sep 13 00:06:09.222000 audit: BPF prog-id=204 op=UNLOAD Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.222000 audit: BPF prog-id=206 op=LOAD Sep 13 00:06:09.222000 audit[5183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=5168 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832366164363236303835646161376234653735393764353639633866 Sep 13 00:06:09.263918 env[1800]: time="2025-09-13T00:06:09.263829606Z" level=info msg="StartContainer for \"1b74fbb3ce6b52419fa84c6dd183c974f6d11666a44a0d674f919a023658b554\" returns successfully" Sep 13 00:06:09.284000 audit[5265]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=5265 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:09.284000 audit[5265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffcc0e7910 a2=0 a3=ffff82417fa8 items=0 ppid=4345 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:09.295975 env[1800]: time="2025-09-13T00:06:09.295886956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-f8688475b-gfns6,Uid:a8be4b28-8b5c-4ca5-b13d-63f217abdcee,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\"" Sep 13 00:06:09.324000 audit[5264]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:09.324000 audit[5264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc1dd0910 a2=0 a3=ffff8e758fa8 items=0 ppid=4345 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.324000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:09.326000 audit[5268]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=5268 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:09.326000 audit[5268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffc3ad7bd0 a2=0 a3=ffff97e91fa8 items=0 ppid=4345 pid=5268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.326000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:09.349470 env[1800]: time="2025-09-13T00:06:09.349400373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tbpg,Uid:0a1b1282-a990-45e1-9198-e7947e011e69,Namespace:calico-system,Attempt:1,} returns sandbox id \"826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926\"" Sep 13 00:06:09.361000 audit[5280]: NETFILTER_CFG table=filter:104 family=2 entries=172 op=nft_register_chain pid=5280 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:09.400876 systemd[1]: Started cri-containerd-27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00.scope. Sep 13 00:06:09.361000 audit[5280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100704 a0=3 a1=ffffe54a9f00 a2=0 a3=ffffbe7ecfa8 items=0 ppid=4345 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.361000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.080 [INFO][5112] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.081 [INFO][5112] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" iface="eth0" netns="/var/run/netns/cni-7babbae9-08e9-fed0-bf81-c7b42075ca1c" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.081 [INFO][5112] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" iface="eth0" netns="/var/run/netns/cni-7babbae9-08e9-fed0-bf81-c7b42075ca1c" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.081 [INFO][5112] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" iface="eth0" netns="/var/run/netns/cni-7babbae9-08e9-fed0-bf81-c7b42075ca1c" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.082 [INFO][5112] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.082 [INFO][5112] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.367 [INFO][5220] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.367 [INFO][5220] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.368 [INFO][5220] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.422 [WARNING][5220] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.423 [INFO][5220] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.434 [INFO][5220] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:09.444712 env[1800]: 2025-09-13 00:06:09.437 [INFO][5112] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:06:09.448288 env[1800]: time="2025-09-13T00:06:09.444827364Z" level=info msg="TearDown network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\" successfully" Sep 13 00:06:09.448288 env[1800]: time="2025-09-13T00:06:09.444875828Z" level=info msg="StopPodSandbox for \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\" returns successfully" Sep 13 00:06:09.448961 env[1800]: time="2025-09-13T00:06:09.448897219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-xhbkk,Uid:826cb41c-6196-44e2-8067-26a5b78bea02,Namespace:kube-system,Attempt:1,}" Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.599000 audit: BPF prog-id=207 op=LOAD Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=5230 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237333031616232326539303831393961643665643761373734323433 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=5230 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237333031616232326539303831393961643665643761373734323433 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.600000 audit: BPF prog-id=208 op=LOAD Sep 13 00:06:09.600000 audit[5256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=5230 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237333031616232326539303831393961643665643761373734323433 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.601000 audit: BPF prog-id=209 op=LOAD Sep 13 00:06:09.601000 audit[5256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=5230 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237333031616232326539303831393961643665643761373734323433 Sep 13 00:06:09.603000 audit: BPF prog-id=209 op=UNLOAD Sep 13 00:06:09.603000 audit: BPF prog-id=208 op=UNLOAD Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:09.603000 audit: BPF prog-id=210 op=LOAD Sep 13 00:06:09.603000 audit[5256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=5230 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237333031616232326539303831393961643665643761373734323433 Sep 13 00:06:09.650279 systemd[1]: run-netns-cni\x2d7babbae9\x2d08e9\x2dfed0\x2dbf81\x2dc7b42075ca1c.mount: Deactivated successfully. Sep 13 00:06:09.739000 audit[5325]: NETFILTER_CFG table=filter:105 family=2 entries=170 op=nft_register_chain pid=5325 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:09.739000 audit[5325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=99108 a0=3 a1=ffffed4646e0 a2=0 a3=ffff98bf1fa8 items=0 ppid=4345 pid=5325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:09.739000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:09.754585 env[1800]: time="2025-09-13T00:06:09.754447646Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d596d8c-6g75b,Uid:e649b2a4-e3e6-4707-952b-39cddc6671e5,Namespace:calico-system,Attempt:1,} returns sandbox id \"27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00\"" Sep 13 00:06:09.806000 audit[5196]: AVC avc: denied { getattr } for pid=5196 comm="coredns" path="cgroup:[4026533050]" dev="nsfs" ino=4026533050 scontext=system_u:system_r:svirt_lxc_net_t:s0:c221,c860 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:06:09.806000 audit[5196]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=40000563d8 a2=40001480f8 a3=0 items=0 ppid=5001 pid=5196 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c221,c860 key=(null) Sep 13 00:06:09.806000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:06:09.858233 systemd-networkd[1518]: cali5e60fccd889: Gained IPv6LL Sep 13 00:06:09.975390 systemd-networkd[1518]: cali36b210a4cde: Link UP Sep 13 00:06:09.987395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:06:09.989497 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali36b210a4cde: link becomes ready Sep 13 00:06:09.987744 systemd-networkd[1518]: cali36b210a4cde: Gained carrier Sep 13 00:06:10.026755 kubelet[2910]: I0913 00:06:10.026599 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-kfggq" podStartSLOduration=61.026570934 podStartE2EDuration="1m1.026570934s" podCreationTimestamp="2025-09-13 00:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:06:09.987336163 +0000 UTC m=+67.918573680" watchObservedRunningTime="2025-09-13 00:06:10.026570934 +0000 UTC m=+67.957808463" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.614 [INFO][5304] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0 coredns-674b8bbfcf- kube-system 826cb41c-6196-44e2-8067-26a5b78bea02 1102 0 2025-09-13 00:05:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-21 coredns-674b8bbfcf-xhbkk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali36b210a4cde [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Namespace="kube-system" Pod="coredns-674b8bbfcf-xhbkk" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.614 [INFO][5304] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Namespace="kube-system" Pod="coredns-674b8bbfcf-xhbkk" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.815 [INFO][5321] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" HandleID="k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.816 [INFO][5321] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" HandleID="k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000376f60), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-21", "pod":"coredns-674b8bbfcf-xhbkk", "timestamp":"2025-09-13 00:06:09.815205223 +0000 UTC"}, Hostname:"ip-172-31-27-21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.816 [INFO][5321] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.816 [INFO][5321] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.816 [INFO][5321] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-21' Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.835 [INFO][5321] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.843 [INFO][5321] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.853 [INFO][5321] ipam/ipam.go 511: Trying affinity for 192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.862 [INFO][5321] ipam/ipam.go 158: Attempting to load block cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.871 [INFO][5321] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.39.128/26 host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.871 [INFO][5321] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.39.128/26 handle="k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.886 [INFO][5321] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.903 [INFO][5321] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.39.128/26 handle="k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.933 [INFO][5321] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.39.137/26] block=192.168.39.128/26 handle="k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.935 [INFO][5321] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.39.137/26] handle="k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" host="ip-172-31-27-21" Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.935 [INFO][5321] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:10.031128 env[1800]: 2025-09-13 00:06:09.935 [INFO][5321] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.39.137/26] IPv6=[] ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" HandleID="k8s-pod-network.8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:10.032433 env[1800]: 2025-09-13 00:06:09.943 [INFO][5304] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Namespace="kube-system" Pod="coredns-674b8bbfcf-xhbkk" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"826cb41c-6196-44e2-8067-26a5b78bea02", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"", Pod:"coredns-674b8bbfcf-xhbkk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.39.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali36b210a4cde", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:10.032433 env[1800]: 2025-09-13 00:06:09.944 [INFO][5304] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.39.137/32] ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Namespace="kube-system" Pod="coredns-674b8bbfcf-xhbkk" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:10.032433 env[1800]: 2025-09-13 00:06:09.944 [INFO][5304] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali36b210a4cde ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Namespace="kube-system" Pod="coredns-674b8bbfcf-xhbkk" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:10.032433 env[1800]: 2025-09-13 00:06:09.989 [INFO][5304] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Namespace="kube-system" Pod="coredns-674b8bbfcf-xhbkk" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:10.032433 env[1800]: 2025-09-13 00:06:09.990 [INFO][5304] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Namespace="kube-system" Pod="coredns-674b8bbfcf-xhbkk" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"826cb41c-6196-44e2-8067-26a5b78bea02", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb", Pod:"coredns-674b8bbfcf-xhbkk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.39.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali36b210a4cde", MAC:"a2:c0:2d:c2:c7:83", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:10.032433 env[1800]: 2025-09-13 00:06:10.027 [INFO][5304] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb" Namespace="kube-system" Pod="coredns-674b8bbfcf-xhbkk" WorkloadEndpoint="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:06:10.046731 systemd-networkd[1518]: calia65782482fe: Gained IPv6LL Sep 13 00:06:10.101387 env[1800]: time="2025-09-13T00:06:10.099962792Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:06:10.101387 env[1800]: time="2025-09-13T00:06:10.100039574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:06:10.103651 env[1800]: time="2025-09-13T00:06:10.101732334Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:06:10.103651 env[1800]: time="2025-09-13T00:06:10.102059297Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb pid=5353 runtime=io.containerd.runc.v2 Sep 13 00:06:10.120000 audit[5354]: NETFILTER_CFG table=filter:106 family=2 entries=20 op=nft_register_rule pid=5354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:10.120000 audit[5354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffde6cf780 a2=0 a3=1 items=0 ppid=3059 pid=5354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:10.125000 audit[5361]: NETFILTER_CFG table=filter:107 family=2 entries=56 op=nft_register_chain pid=5361 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:10.125000 audit[5361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25080 a0=3 a1=ffffe156e1b0 a2=0 a3=ffffad185fa8 items=0 ppid=4345 pid=5361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.125000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:10.131000 audit[5354]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=5354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:10.131000 audit[5354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffde6cf780 a2=0 a3=1 items=0 ppid=3059 pid=5354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:10.202409 systemd[1]: Started cri-containerd-8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb.scope. Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.319000 audit: BPF prog-id=211 op=LOAD Sep 13 00:06:10.322000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.322000 audit[5364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5353 pid=5364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363266306665336466363231373934306536656364626238656534 Sep 13 00:06:10.323000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.323000 audit[5364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5353 pid=5364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363266306665336466363231373934306536656364626238656534 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.324000 audit: BPF prog-id=212 op=LOAD Sep 13 00:06:10.324000 audit[5364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5353 pid=5364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363266306665336466363231373934306536656364626238656534 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.326000 audit: BPF prog-id=213 op=LOAD Sep 13 00:06:10.326000 audit[5364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5353 pid=5364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363266306665336466363231373934306536656364626238656534 Sep 13 00:06:10.329000 audit: BPF prog-id=213 op=UNLOAD Sep 13 00:06:10.329000 audit: BPF prog-id=212 op=UNLOAD Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { perfmon } for pid=5364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit[5364]: AVC avc: denied { bpf } for pid=5364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.329000 audit: BPF prog-id=214 op=LOAD Sep 13 00:06:10.329000 audit[5364]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5353 pid=5364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363266306665336466363231373934306536656364626238656534 Sep 13 00:06:10.401723 env[1800]: time="2025-09-13T00:06:10.400630457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-xhbkk,Uid:826cb41c-6196-44e2-8067-26a5b78bea02,Namespace:kube-system,Attempt:1,} returns sandbox id \"8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb\"" Sep 13 00:06:10.425262 env[1800]: time="2025-09-13T00:06:10.425194750Z" level=info msg="CreateContainer within sandbox \"8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Sep 13 00:06:10.476133 env[1800]: time="2025-09-13T00:06:10.476050977Z" level=info msg="CreateContainer within sandbox \"8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b3fc94209439feef875e06255d65b7f1d124e1d463ed9a69dec0a3fe8c3cf8c5\"" Sep 13 00:06:10.478744 env[1800]: time="2025-09-13T00:06:10.477783202Z" level=info msg="StartContainer for \"b3fc94209439feef875e06255d65b7f1d124e1d463ed9a69dec0a3fe8c3cf8c5\"" Sep 13 00:06:10.541992 systemd[1]: Started cri-containerd-b3fc94209439feef875e06255d65b7f1d124e1d463ed9a69dec0a3fe8c3cf8c5.scope. Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.595000 audit: BPF prog-id=215 op=LOAD Sep 13 00:06:10.597000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.597000 audit[5399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=5353 pid=5399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666339343230393433396665656638373565303632353564363562 Sep 13 00:06:10.598000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.598000 audit[5399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=5353 pid=5399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666339343230393433396665656638373565303632353564363562 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.599000 audit: BPF prog-id=216 op=LOAD Sep 13 00:06:10.599000 audit[5399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=5353 pid=5399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666339343230393433396665656638373565303632353564363562 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.600000 audit: BPF prog-id=217 op=LOAD Sep 13 00:06:10.600000 audit[5399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=5353 pid=5399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666339343230393433396665656638373565303632353564363562 Sep 13 00:06:10.602000 audit: BPF prog-id=217 op=UNLOAD Sep 13 00:06:10.602000 audit: BPF prog-id=216 op=UNLOAD Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { perfmon } for pid=5399 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit[5399]: AVC avc: denied { bpf } for pid=5399 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:10.602000 audit: BPF prog-id=218 op=LOAD Sep 13 00:06:10.602000 audit[5399]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=5353 pid=5399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:10.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233666339343230393433396665656638373565303632353564363562 Sep 13 00:06:10.639463 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2304942733.mount: Deactivated successfully. Sep 13 00:06:10.676582 env[1800]: time="2025-09-13T00:06:10.676350770Z" level=info msg="StartContainer for \"b3fc94209439feef875e06255d65b7f1d124e1d463ed9a69dec0a3fe8c3cf8c5\" returns successfully" Sep 13 00:06:10.700000 audit[5409]: AVC avc: denied { getattr } for pid=5409 comm="coredns" path="cgroup:[4026533067]" dev="nsfs" ino=4026533067 scontext=system_u:system_r:svirt_lxc_net_t:s0:c42,c116 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Sep 13 00:06:10.700000 audit[5409]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000404828 a2=40000da578 a3=0 items=0 ppid=5353 pid=5409 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c42,c116 key=(null) Sep 13 00:06:10.700000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Sep 13 00:06:10.754006 systemd-networkd[1518]: califd23ec105c7: Gained IPv6LL Sep 13 00:06:11.008901 kubelet[2910]: I0913 00:06:11.008792 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-xhbkk" podStartSLOduration=62.00876817 podStartE2EDuration="1m2.00876817s" podCreationTimestamp="2025-09-13 00:05:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-09-13 00:06:10.975051737 +0000 UTC m=+68.906289266" watchObservedRunningTime="2025-09-13 00:06:11.00876817 +0000 UTC m=+68.940005687" Sep 13 00:06:11.121000 audit[5428]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=5428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:11.121000 audit[5428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffd74c7fc0 a2=0 a3=1 items=0 ppid=3059 pid=5428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:11.125000 audit[5428]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=5428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:11.125000 audit[5428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffd74c7fc0 a2=0 a3=1 items=0 ppid=3059 pid=5428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:11.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.21:22-139.178.89.65:51086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:11.191324 systemd[1]: Started sshd@8-172.31.27.21:22-139.178.89.65:51086.service. Sep 13 00:06:11.238000 audit[5430]: NETFILTER_CFG table=filter:111 family=2 entries=17 op=nft_register_rule pid=5430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:11.238000 audit[5430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd1759ca0 a2=0 a3=1 items=0 ppid=3059 pid=5430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:11.262729 systemd-networkd[1518]: cali36b210a4cde: Gained IPv6LL Sep 13 00:06:11.325000 audit[5430]: NETFILTER_CFG table=nat:112 family=2 entries=47 op=nft_register_chain pid=5430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:11.325000 audit[5430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffd1759ca0 a2=0 a3=1 items=0 ppid=3059 pid=5430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:11.406000 audit[5432]: USER_ACCT pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:11.407240 sshd[5432]: Accepted publickey for core from 139.178.89.65 port 51086 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:11.409000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:11.409000 audit[5432]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9b01800 a2=3 a3=1 items=0 ppid=1 pid=5432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:11.409000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:11.411238 sshd[5432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:11.421376 systemd-logind[1793]: New session 9 of user core. Sep 13 00:06:11.422723 systemd[1]: Started session-9.scope. Sep 13 00:06:11.435000 audit[5432]: USER_START pid=5432 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:11.438000 audit[5435]: CRED_ACQ pid=5435 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:11.838861 sshd[5432]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:11.842000 audit[5432]: USER_END pid=5432 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:11.842000 audit[5432]: CRED_DISP pid=5432 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:11.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.21:22-139.178.89.65:51086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:11.845797 systemd[1]: sshd@8-172.31.27.21:22-139.178.89.65:51086.service: Deactivated successfully. Sep 13 00:06:11.847292 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 00:06:11.850600 systemd-logind[1793]: Session 9 logged out. Waiting for processes to exit. Sep 13 00:06:11.853002 systemd-logind[1793]: Removed session 9. Sep 13 00:06:11.934020 env[1800]: time="2025-09-13T00:06:11.933952160Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:11.938783 env[1800]: time="2025-09-13T00:06:11.938724542Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:632fbde00b1918016ac07458e79cc438ccda83cb762bfd5fc50a26721abced08,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:11.944671 env[1800]: time="2025-09-13T00:06:11.944606530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:11.950712 env[1800]: time="2025-09-13T00:06:11.950642587Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:11.951666 env[1800]: time="2025-09-13T00:06:11.951608995Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:632fbde00b1918016ac07458e79cc438ccda83cb762bfd5fc50a26721abced08\"" Sep 13 00:06:11.960136 env[1800]: time="2025-09-13T00:06:11.960071872Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\"" Sep 13 00:06:11.966212 env[1800]: time="2025-09-13T00:06:11.966150537Z" level=info msg="CreateContainer within sandbox \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:06:12.009085 env[1800]: time="2025-09-13T00:06:12.009015503Z" level=info msg="CreateContainer within sandbox \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\"" Sep 13 00:06:12.010844 env[1800]: time="2025-09-13T00:06:12.010786203Z" level=info msg="StartContainer for \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\"" Sep 13 00:06:12.073550 systemd[1]: Started cri-containerd-bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901.scope. Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.138000 audit: BPF prog-id=219 op=LOAD Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4535 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:12.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386331393532376135633035323331373265346437633131326534 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4535 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:12.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386331393532376135633035323331373265346437633131326534 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit: BPF prog-id=220 op=LOAD Sep 13 00:06:12.140000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4535 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:12.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386331393532376135633035323331373265346437633131326534 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit: BPF prog-id=221 op=LOAD Sep 13 00:06:12.140000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4535 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:12.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386331393532376135633035323331373265346437633131326534 Sep 13 00:06:12.140000 audit: BPF prog-id=221 op=UNLOAD Sep 13 00:06:12.140000 audit: BPF prog-id=220 op=UNLOAD Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { perfmon } for pid=5453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit[5453]: AVC avc: denied { bpf } for pid=5453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:12.140000 audit: BPF prog-id=222 op=LOAD Sep 13 00:06:12.140000 audit[5453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4535 pid=5453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:12.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264386331393532376135633035323331373265346437633131326534 Sep 13 00:06:12.194487 env[1800]: time="2025-09-13T00:06:12.194420228Z" level=info msg="StartContainer for \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\" returns successfully" Sep 13 00:06:13.083000 audit[5486]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:13.086714 kernel: kauditd_printk_skb: 681 callbacks suppressed Sep 13 00:06:13.086935 kernel: audit: type=1325 audit(1757721973.083:1431): table=filter:113 family=2 entries=14 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:13.083000 audit[5486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffff7a78a0 a2=0 a3=1 items=0 ppid=3059 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:13.121961 kernel: audit: type=1300 audit(1757721973.083:1431): arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffff7a78a0 a2=0 a3=1 items=0 ppid=3059 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.122115 kernel: audit: type=1327 audit(1757721973.083:1431): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:13.114000 audit[5486]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:13.149555 kernel: audit: type=1325 audit(1757721973.114:1432): table=nat:114 family=2 entries=20 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:13.114000 audit[5486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffff7a78a0 a2=0 a3=1 items=0 ppid=3059 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.166273 kernel: audit: type=1300 audit(1757721973.114:1432): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffff7a78a0 a2=0 a3=1 items=0 ppid=3059 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:13.199656 kernel: audit: type=1327 audit(1757721973.114:1432): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:13.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:14.737000 audit[5464]: AVC avc: denied { watch } for pid=5464 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_05_51.4247465395/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c882,c934 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c882,c934 tclass=file permissive=0 Sep 13 00:06:14.737000 audit[5464]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40025ca9a0 a2=fc6 a3=0 items=0 ppid=4535 pid=5464 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c882,c934 key=(null) Sep 13 00:06:14.767029 kernel: audit: type=1400 audit(1757721974.737:1433): avc: denied { watch } for pid=5464 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_05_51.4247465395/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c882,c934 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c882,c934 tclass=file permissive=0 Sep 13 00:06:14.767176 kernel: audit: type=1300 audit(1757721974.737:1433): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40025ca9a0 a2=fc6 a3=0 items=0 ppid=4535 pid=5464 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c882,c934 key=(null) Sep 13 00:06:14.781883 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2843259695.mount: Deactivated successfully. Sep 13 00:06:14.737000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:06:14.802542 kernel: audit: type=1327 audit(1757721974.737:1433): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:06:14.871484 kubelet[2910]: I0913 00:06:14.871379 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-f8688475b-snkh7" podStartSLOduration=39.643195208 podStartE2EDuration="46.871352622s" podCreationTimestamp="2025-09-13 00:05:28 +0000 UTC" firstStartedPulling="2025-09-13 00:06:04.730121863 +0000 UTC m=+62.661359380" lastFinishedPulling="2025-09-13 00:06:11.958279289 +0000 UTC m=+69.889516794" observedRunningTime="2025-09-13 00:06:12.990086028 +0000 UTC m=+70.921323569" watchObservedRunningTime="2025-09-13 00:06:14.871352622 +0000 UTC m=+72.802590139" Sep 13 00:06:14.959000 audit[5494]: NETFILTER_CFG table=filter:115 family=2 entries=13 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:14.970566 kernel: audit: type=1325 audit(1757721974.959:1434): table=filter:115 family=2 entries=13 op=nft_register_rule pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:14.959000 audit[5494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffdcaa7430 a2=0 a3=1 items=0 ppid=3059 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:14.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:14.974000 audit[5494]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=5494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:14.974000 audit[5494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffdcaa7430 a2=0 a3=1 items=0 ppid=3059 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:14.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:16.016541 env[1800]: time="2025-09-13T00:06:16.016456879Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:16.022027 env[1800]: time="2025-09-13T00:06:16.021967889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:14088376331a0622b7f6a2fbc2f2932806a6eafdd7b602f6139d3b985bf1e685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:16.026668 env[1800]: time="2025-09-13T00:06:16.026606893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/goldmane:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:16.031126 env[1800]: time="2025-09-13T00:06:16.031070924Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/goldmane@sha256:46297703ab3739331a00a58f0d6a5498c8d3b6523ad947eed68592ee0f3e79f0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:16.035031 env[1800]: time="2025-09-13T00:06:16.033099463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.3\" returns image reference \"sha256:14088376331a0622b7f6a2fbc2f2932806a6eafdd7b602f6139d3b985bf1e685\"" Sep 13 00:06:16.038200 env[1800]: time="2025-09-13T00:06:16.038140116Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\"" Sep 13 00:06:16.044621 env[1800]: time="2025-09-13T00:06:16.044555903Z" level=info msg="CreateContainer within sandbox \"8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b\" for container &ContainerMetadata{Name:goldmane,Attempt:0,}" Sep 13 00:06:16.069397 env[1800]: time="2025-09-13T00:06:16.069301856Z" level=info msg="CreateContainer within sandbox \"8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b\" for &ContainerMetadata{Name:goldmane,Attempt:0,} returns container id \"9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b\"" Sep 13 00:06:16.073370 env[1800]: time="2025-09-13T00:06:16.073313337Z" level=info msg="StartContainer for \"9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b\"" Sep 13 00:06:16.160206 systemd[1]: run-containerd-runc-k8s.io-9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b-runc.3IZ053.mount: Deactivated successfully. Sep 13 00:06:16.164355 systemd[1]: Started cri-containerd-9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b.scope. Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.211000 audit: BPF prog-id=223 op=LOAD Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4698 pid=5505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961333836323861346466343334383538326235616333393963613537 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4698 pid=5505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961333836323861346466343334383538326235616333393963613537 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit: BPF prog-id=224 op=LOAD Sep 13 00:06:16.213000 audit[5505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4698 pid=5505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961333836323861346466343334383538326235616333393963613537 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit: BPF prog-id=225 op=LOAD Sep 13 00:06:16.213000 audit[5505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4698 pid=5505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961333836323861346466343334383538326235616333393963613537 Sep 13 00:06:16.213000 audit: BPF prog-id=225 op=UNLOAD Sep 13 00:06:16.213000 audit: BPF prog-id=224 op=UNLOAD Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { perfmon } for pid=5505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit[5505]: AVC avc: denied { bpf } for pid=5505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:16.213000 audit: BPF prog-id=226 op=LOAD Sep 13 00:06:16.213000 audit[5505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4698 pid=5505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:16.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961333836323861346466343334383538326235616333393963613537 Sep 13 00:06:16.264753 env[1800]: time="2025-09-13T00:06:16.264686958Z" level=info msg="StartContainer for \"9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b\" returns successfully" Sep 13 00:06:16.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.21:22-139.178.89.65:51092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:16.866610 systemd[1]: Started sshd@9-172.31.27.21:22-139.178.89.65:51092.service. Sep 13 00:06:17.072000 audit[5534]: USER_ACCT pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.073753 sshd[5534]: Accepted publickey for core from 139.178.89.65 port 51092 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:17.077000 audit[5534]: CRED_ACQ pid=5534 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.077000 audit[5534]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0a22b40 a2=3 a3=1 items=0 ppid=1 pid=5534 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:17.077000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:17.081033 sshd[5534]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:17.102099 systemd-logind[1793]: New session 10 of user core. Sep 13 00:06:17.103226 systemd[1]: Started session-10.scope. Sep 13 00:06:17.116000 audit[5553]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:17.116000 audit[5553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd5fb4280 a2=0 a3=1 items=0 ppid=3059 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:17.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:17.124000 audit[5553]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:17.124000 audit[5553]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd5fb4280 a2=0 a3=1 items=0 ppid=3059 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:17.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:17.137000 audit[5534]: USER_START pid=5534 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.141000 audit[5554]: CRED_ACQ pid=5554 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.591188 sshd[5534]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:17.593000 audit[5534]: USER_END pid=5534 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.594000 audit[5534]: CRED_DISP pid=5534 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.597233 systemd[1]: sshd@9-172.31.27.21:22-139.178.89.65:51092.service: Deactivated successfully. Sep 13 00:06:17.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.21:22-139.178.89.65:51092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:17.598720 systemd[1]: session-10.scope: Deactivated successfully. Sep 13 00:06:17.601899 systemd-logind[1793]: Session 10 logged out. Waiting for processes to exit. Sep 13 00:06:17.604877 systemd-logind[1793]: Removed session 10. Sep 13 00:06:17.621135 systemd[1]: Started sshd@10-172.31.27.21:22-139.178.89.65:51108.service. Sep 13 00:06:17.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.21:22-139.178.89.65:51108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:17.803000 audit[5569]: USER_ACCT pid=5569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.804837 sshd[5569]: Accepted publickey for core from 139.178.89.65 port 51108 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:17.806000 audit[5569]: CRED_ACQ pid=5569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.808000 audit[5569]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3d20e20 a2=3 a3=1 items=0 ppid=1 pid=5569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:17.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:17.811016 sshd[5569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:17.821255 systemd[1]: Started session-11.scope. Sep 13 00:06:17.828697 systemd-logind[1793]: New session 11 of user core. Sep 13 00:06:17.862000 audit[5569]: USER_START pid=5569 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:17.865000 audit[5571]: CRED_ACQ pid=5571 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.095223 systemd[1]: run-containerd-runc-k8s.io-9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b-runc.3oNPG1.mount: Deactivated successfully. Sep 13 00:06:18.478524 sshd[5569]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:18.482723 kernel: kauditd_printk_skb: 87 callbacks suppressed Sep 13 00:06:18.482889 kernel: audit: type=1106 audit(1757721978.478:1471): pid=5569 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.478000 audit[5569]: USER_END pid=5569 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.493301 systemd[1]: sshd@10-172.31.27.21:22-139.178.89.65:51108.service: Deactivated successfully. Sep 13 00:06:18.496220 systemd[1]: session-11.scope: Deactivated successfully. Sep 13 00:06:18.478000 audit[5569]: CRED_DISP pid=5569 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.498446 systemd-logind[1793]: Session 11 logged out. Waiting for processes to exit. Sep 13 00:06:18.506618 kernel: audit: type=1104 audit(1757721978.478:1472): pid=5569 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.21:22-139.178.89.65:51108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:18.523408 kernel: audit: type=1131 audit(1757721978.492:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.21:22-139.178.89.65:51108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:18.524726 systemd[1]: Started sshd@11-172.31.27.21:22-139.178.89.65:51118.service. Sep 13 00:06:18.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.21:22-139.178.89.65:51118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:18.528595 systemd-logind[1793]: Removed session 11. Sep 13 00:06:18.536030 kernel: audit: type=1130 audit(1757721978.523:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.21:22-139.178.89.65:51118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:18.754000 audit[5600]: USER_ACCT pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.766086 sshd[5600]: Accepted publickey for core from 139.178.89.65 port 51118 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:18.769502 sshd[5600]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:18.767000 audit[5600]: CRED_ACQ pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.779008 kernel: audit: type=1101 audit(1757721978.754:1475): pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.779164 kernel: audit: type=1103 audit(1757721978.767:1476): pid=5600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.794730 kernel: audit: type=1006 audit(1757721978.767:1477): pid=5600 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Sep 13 00:06:18.793479 systemd[1]: Started session-12.scope. Sep 13 00:06:18.767000 audit[5600]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0405810 a2=3 a3=1 items=0 ppid=1 pid=5600 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:18.797568 systemd-logind[1793]: New session 12 of user core. Sep 13 00:06:18.808493 kernel: audit: type=1300 audit(1757721978.767:1477): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0405810 a2=3 a3=1 items=0 ppid=1 pid=5600 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:18.767000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:18.816055 kernel: audit: type=1327 audit(1757721978.767:1477): proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:18.819000 audit[5600]: USER_START pid=5600 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.820000 audit[5602]: CRED_ACQ pid=5602 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:18.833602 kernel: audit: type=1105 audit(1757721978.819:1478): pid=5600 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:19.178783 systemd[1]: run-containerd-runc-k8s.io-9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b-runc.d337Uk.mount: Deactivated successfully. Sep 13 00:06:19.245981 sshd[5600]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:19.246000 audit[5600]: USER_END pid=5600 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:19.246000 audit[5600]: CRED_DISP pid=5600 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:19.252043 systemd[1]: sshd@11-172.31.27.21:22-139.178.89.65:51118.service: Deactivated successfully. Sep 13 00:06:19.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.21:22-139.178.89.65:51118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:19.254117 systemd[1]: session-12.scope: Deactivated successfully. Sep 13 00:06:19.258809 systemd-logind[1793]: Session 12 logged out. Waiting for processes to exit. Sep 13 00:06:19.261698 systemd-logind[1793]: Removed session 12. Sep 13 00:06:19.357838 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3681194904.mount: Deactivated successfully. Sep 13 00:06:19.388314 env[1800]: time="2025-09-13T00:06:19.388240907Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:19.397725 env[1800]: time="2025-09-13T00:06:19.397665719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e210e86234bc99f018431b30477c5ca2ad6f7ecf67ef011498f7beb48fb0b21f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:19.403573 env[1800]: time="2025-09-13T00:06:19.403466609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/whisker-backend:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:19.407829 env[1800]: time="2025-09-13T00:06:19.407775233Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/whisker-backend@sha256:29becebc47401da9997a2a30f4c25c511a5f379d17275680b048224829af71a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:19.409444 env[1800]: time="2025-09-13T00:06:19.409350341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.3\" returns image reference \"sha256:e210e86234bc99f018431b30477c5ca2ad6f7ecf67ef011498f7beb48fb0b21f\"" Sep 13 00:06:19.415771 env[1800]: time="2025-09-13T00:06:19.415717956Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:06:19.426220 env[1800]: time="2025-09-13T00:06:19.426153887Z" level=info msg="CreateContainer within sandbox \"884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed\" for container &ContainerMetadata{Name:whisker-backend,Attempt:0,}" Sep 13 00:06:19.480458 env[1800]: time="2025-09-13T00:06:19.480395288Z" level=info msg="CreateContainer within sandbox \"884f5a360a00e2c6a51d1e66171e0dab9f476eb3fd41e57039313d56a81a95ed\" for &ContainerMetadata{Name:whisker-backend,Attempt:0,} returns container id \"4a0357b086ecc6508176e1142269d1acb93c7ae2bed3e29f8b9ed47a1ed1c016\"" Sep 13 00:06:19.482925 env[1800]: time="2025-09-13T00:06:19.482806313Z" level=info msg="StartContainer for \"4a0357b086ecc6508176e1142269d1acb93c7ae2bed3e29f8b9ed47a1ed1c016\"" Sep 13 00:06:19.533246 systemd[1]: Started cri-containerd-4a0357b086ecc6508176e1142269d1acb93c7ae2bed3e29f8b9ed47a1ed1c016.scope. Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.588000 audit: BPF prog-id=227 op=LOAD Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4372 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303335376230383665636336353038313736653131343232363964 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4372 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303335376230383665636336353038313736653131343232363964 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.590000 audit: BPF prog-id=228 op=LOAD Sep 13 00:06:19.590000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4372 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303335376230383665636336353038313736653131343232363964 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit: BPF prog-id=229 op=LOAD Sep 13 00:06:19.591000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4372 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303335376230383665636336353038313736653131343232363964 Sep 13 00:06:19.591000 audit: BPF prog-id=229 op=UNLOAD Sep 13 00:06:19.591000 audit: BPF prog-id=228 op=UNLOAD Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { perfmon } for pid=5648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit[5648]: AVC avc: denied { bpf } for pid=5648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.591000 audit: BPF prog-id=230 op=LOAD Sep 13 00:06:19.591000 audit[5648]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4372 pid=5648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461303335376230383665636336353038313736653131343232363964 Sep 13 00:06:19.646035 env[1800]: time="2025-09-13T00:06:19.645918215Z" level=info msg="StartContainer for \"4a0357b086ecc6508176e1142269d1acb93c7ae2bed3e29f8b9ed47a1ed1c016\" returns successfully" Sep 13 00:06:19.786583 env[1800]: time="2025-09-13T00:06:19.784171032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:19.788959 env[1800]: time="2025-09-13T00:06:19.788886600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:632fbde00b1918016ac07458e79cc438ccda83cb762bfd5fc50a26721abced08,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:19.792299 env[1800]: time="2025-09-13T00:06:19.792247822Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:19.795671 env[1800]: time="2025-09-13T00:06:19.795605181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:19.797014 env[1800]: time="2025-09-13T00:06:19.796933920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:632fbde00b1918016ac07458e79cc438ccda83cb762bfd5fc50a26721abced08\"" Sep 13 00:06:19.800999 env[1800]: time="2025-09-13T00:06:19.800928284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\"" Sep 13 00:06:19.811030 env[1800]: time="2025-09-13T00:06:19.810968394Z" level=info msg="CreateContainer within sandbox \"4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:06:19.841030 env[1800]: time="2025-09-13T00:06:19.840968649Z" level=info msg="CreateContainer within sandbox \"4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"704733e3b3d90c2eded5178a18d6225f1239e8212491e1e3c157d7c7a3752fea\"" Sep 13 00:06:19.842627 env[1800]: time="2025-09-13T00:06:19.842549517Z" level=info msg="StartContainer for \"704733e3b3d90c2eded5178a18d6225f1239e8212491e1e3c157d7c7a3752fea\"" Sep 13 00:06:19.877044 systemd[1]: Started cri-containerd-704733e3b3d90c2eded5178a18d6225f1239e8212491e1e3c157d7c7a3752fea.scope. Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.927000 audit: BPF prog-id=231 op=LOAD Sep 13 00:06:19.929000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.929000 audit[5687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4948 pid=5687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343733336533623364393063326564656435313738613138643632 Sep 13 00:06:19.929000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.929000 audit[5687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4948 pid=5687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343733336533623364393063326564656435313738613138643632 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.930000 audit: BPF prog-id=232 op=LOAD Sep 13 00:06:19.930000 audit[5687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4948 pid=5687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343733336533623364393063326564656435313738613138643632 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.932000 audit: BPF prog-id=233 op=LOAD Sep 13 00:06:19.932000 audit[5687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4948 pid=5687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343733336533623364393063326564656435313738613138643632 Sep 13 00:06:19.934000 audit: BPF prog-id=233 op=UNLOAD Sep 13 00:06:19.934000 audit: BPF prog-id=232 op=UNLOAD Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { perfmon } for pid=5687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit[5687]: AVC avc: denied { bpf } for pid=5687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:19.935000 audit: BPF prog-id=234 op=LOAD Sep 13 00:06:19.935000 audit[5687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4948 pid=5687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:19.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343733336533623364393063326564656435313738613138643632 Sep 13 00:06:19.989104 env[1800]: time="2025-09-13T00:06:19.988999765Z" level=info msg="StartContainer for \"704733e3b3d90c2eded5178a18d6225f1239e8212491e1e3c157d7c7a3752fea\" returns successfully" Sep 13 00:06:20.047656 kubelet[2910]: I0913 00:06:20.047447 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/goldmane-54d579b49d-rdxkn" podStartSLOduration=32.130152116 podStartE2EDuration="41.0474239s" podCreationTimestamp="2025-09-13 00:05:39 +0000 UTC" firstStartedPulling="2025-09-13 00:06:07.11931741 +0000 UTC m=+65.050554927" lastFinishedPulling="2025-09-13 00:06:16.036589206 +0000 UTC m=+73.967826711" observedRunningTime="2025-09-13 00:06:17.014215061 +0000 UTC m=+74.945452590" watchObservedRunningTime="2025-09-13 00:06:20.0474239 +0000 UTC m=+77.978661453" Sep 13 00:06:20.088373 kubelet[2910]: I0913 00:06:20.088266 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6764956d8d-gcsgl" podStartSLOduration=38.556586302 podStartE2EDuration="50.088219052s" podCreationTimestamp="2025-09-13 00:05:30 +0000 UTC" firstStartedPulling="2025-09-13 00:06:08.26755084 +0000 UTC m=+66.198788345" lastFinishedPulling="2025-09-13 00:06:19.79918359 +0000 UTC m=+77.730421095" observedRunningTime="2025-09-13 00:06:20.052943942 +0000 UTC m=+77.984181471" watchObservedRunningTime="2025-09-13 00:06:20.088219052 +0000 UTC m=+78.019456569" Sep 13 00:06:20.161622 env[1800]: time="2025-09-13T00:06:20.161501138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:20.168000 audit[5716]: NETFILTER_CFG table=filter:119 family=2 entries=12 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:20.170723 env[1800]: time="2025-09-13T00:06:20.170647340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:632fbde00b1918016ac07458e79cc438ccda83cb762bfd5fc50a26721abced08,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:20.168000 audit[5716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcfc43930 a2=0 a3=1 items=0 ppid=3059 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:20.176102 env[1800]: time="2025-09-13T00:06:20.176035439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:20.182032 env[1800]: time="2025-09-13T00:06:20.181945614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:6a24147f11c1edce9d6ba79bdb0c2beadec53853fb43438a287291e67b41e51b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:20.180000 audit[5716]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:20.180000 audit[5716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcfc43930 a2=0 a3=1 items=0 ppid=3059 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:20.184662 env[1800]: time="2025-09-13T00:06:20.183441288Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.3\" returns image reference \"sha256:632fbde00b1918016ac07458e79cc438ccda83cb762bfd5fc50a26721abced08\"" Sep 13 00:06:20.187192 env[1800]: time="2025-09-13T00:06:20.187117113Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:06:20.194570 env[1800]: time="2025-09-13T00:06:20.194452491Z" level=info msg="CreateContainer within sandbox \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Sep 13 00:06:20.249962 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount169232684.mount: Deactivated successfully. Sep 13 00:06:20.251066 env[1800]: time="2025-09-13T00:06:20.250979953Z" level=info msg="CreateContainer within sandbox \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\"" Sep 13 00:06:20.252610 env[1800]: time="2025-09-13T00:06:20.252103866Z" level=info msg="StartContainer for \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\"" Sep 13 00:06:20.264000 audit[5725]: NETFILTER_CFG table=filter:121 family=2 entries=11 op=nft_register_rule pid=5725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:20.264000 audit[5725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffffefc3c90 a2=0 a3=1 items=0 ppid=3059 pid=5725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.264000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:20.288000 audit[5725]: NETFILTER_CFG table=nat:122 family=2 entries=29 op=nft_register_chain pid=5725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:20.288000 audit[5725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=fffffefc3c90 a2=0 a3=1 items=0 ppid=3059 pid=5725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:20.316332 systemd[1]: Started cri-containerd-3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652.scope. Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.393000 audit: BPF prog-id=235 op=LOAD Sep 13 00:06:20.395000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.395000 audit[5733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5052 pid=5733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666131376439353633303834643231393361633366336531656135 Sep 13 00:06:20.395000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.395000 audit[5733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5052 pid=5733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666131376439353633303834643231393361633366336531656135 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.396000 audit: BPF prog-id=236 op=LOAD Sep 13 00:06:20.396000 audit[5733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5052 pid=5733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666131376439353633303834643231393361633366336531656135 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.398000 audit: BPF prog-id=237 op=LOAD Sep 13 00:06:20.398000 audit[5733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5052 pid=5733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666131376439353633303834643231393361633366336531656135 Sep 13 00:06:20.399000 audit: BPF prog-id=237 op=UNLOAD Sep 13 00:06:20.399000 audit: BPF prog-id=236 op=UNLOAD Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { perfmon } for pid=5733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit[5733]: AVC avc: denied { bpf } for pid=5733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:20.399000 audit: BPF prog-id=238 op=LOAD Sep 13 00:06:20.399000 audit[5733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5052 pid=5733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:20.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666131376439353633303834643231393361633366336531656135 Sep 13 00:06:20.450206 env[1800]: time="2025-09-13T00:06:20.450137285Z" level=info msg="StartContainer for \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\" returns successfully" Sep 13 00:06:21.051053 kubelet[2910]: I0913 00:06:21.050972 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/whisker-867bc58656-kbrt4" podStartSLOduration=3.982946108 podStartE2EDuration="20.050946289s" podCreationTimestamp="2025-09-13 00:06:01 +0000 UTC" firstStartedPulling="2025-09-13 00:06:03.343959221 +0000 UTC m=+61.275196738" lastFinishedPulling="2025-09-13 00:06:19.411959402 +0000 UTC m=+77.343196919" observedRunningTime="2025-09-13 00:06:20.090301276 +0000 UTC m=+78.021538877" watchObservedRunningTime="2025-09-13 00:06:21.050946289 +0000 UTC m=+78.982183806" Sep 13 00:06:21.364000 audit[5766]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=5766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:21.364000 audit[5766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc122d980 a2=0 a3=1 items=0 ppid=3059 pid=5766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:21.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:21.370000 audit[5766]: NETFILTER_CFG table=nat:124 family=2 entries=32 op=nft_register_rule pid=5766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:21.370000 audit[5766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10116 a0=3 a1=ffffc122d980 a2=0 a3=1 items=0 ppid=3059 pid=5766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:21.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:21.648108 env[1800]: time="2025-09-13T00:06:21.647960582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:21.653428 env[1800]: time="2025-09-13T00:06:21.653348520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:21.657288 env[1800]: time="2025-09-13T00:06:21.657231973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:21.661055 env[1800]: time="2025-09-13T00:06:21.660996430Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:21.662264 env[1800]: time="2025-09-13T00:06:21.662205779Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 13 00:06:21.667662 env[1800]: time="2025-09-13T00:06:21.667599681Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\"" Sep 13 00:06:21.674663 env[1800]: time="2025-09-13T00:06:21.674563522Z" level=info msg="CreateContainer within sandbox \"826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:06:21.721184 env[1800]: time="2025-09-13T00:06:21.721114219Z" level=info msg="CreateContainer within sandbox \"826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"79292096e2cfb0ffabfdb98bf80fc6c12de73d9954b95bba5cecd1dec9ec9214\"" Sep 13 00:06:21.725955 env[1800]: time="2025-09-13T00:06:21.725885429Z" level=info msg="StartContainer for \"79292096e2cfb0ffabfdb98bf80fc6c12de73d9954b95bba5cecd1dec9ec9214\"" Sep 13 00:06:21.802345 systemd[1]: Started cri-containerd-79292096e2cfb0ffabfdb98bf80fc6c12de73d9954b95bba5cecd1dec9ec9214.scope. Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=5168 pid=5775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:21.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323932303936653263666230666661626664623938626638306663 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit: BPF prog-id=239 op=LOAD Sep 13 00:06:21.936000 audit[5775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=5168 pid=5775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:21.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323932303936653263666230666661626664623938626638306663 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit: BPF prog-id=240 op=LOAD Sep 13 00:06:21.936000 audit[5775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=5168 pid=5775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:21.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323932303936653263666230666661626664623938626638306663 Sep 13 00:06:21.936000 audit: BPF prog-id=240 op=UNLOAD Sep 13 00:06:21.936000 audit: BPF prog-id=239 op=UNLOAD Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { perfmon } for pid=5775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit[5775]: AVC avc: denied { bpf } for pid=5775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:21.936000 audit: BPF prog-id=241 op=LOAD Sep 13 00:06:21.936000 audit[5775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=5168 pid=5775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:21.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739323932303936653263666230666661626664623938626638306663 Sep 13 00:06:21.988553 env[1800]: time="2025-09-13T00:06:21.988449602Z" level=info msg="StartContainer for \"79292096e2cfb0ffabfdb98bf80fc6c12de73d9954b95bba5cecd1dec9ec9214\" returns successfully" Sep 13 00:06:23.303000 audit[5743]: AVC avc: denied { watch } for pid=5743 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_05_51.2344577703/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c556 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c151,c556 tclass=file permissive=0 Sep 13 00:06:23.303000 audit[5743]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000b8abc0 a2=fc6 a3=0 items=0 ppid=5052 pid=5743 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c556 key=(null) Sep 13 00:06:23.303000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:06:23.370466 kubelet[2910]: I0913 00:06:23.370385 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-f8688475b-gfns6" podStartSLOduration=45.493945555 podStartE2EDuration="56.370364358s" podCreationTimestamp="2025-09-13 00:05:27 +0000 UTC" firstStartedPulling="2025-09-13 00:06:09.309543235 +0000 UTC m=+67.240780752" lastFinishedPulling="2025-09-13 00:06:20.185962038 +0000 UTC m=+78.117199555" observedRunningTime="2025-09-13 00:06:21.053761121 +0000 UTC m=+78.984998650" watchObservedRunningTime="2025-09-13 00:06:23.370364358 +0000 UTC m=+81.301601875" Sep 13 00:06:23.464000 audit[5804]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:23.464000 audit[5804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe2a6de90 a2=0 a3=1 items=0 ppid=3059 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:23.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:23.478000 audit[5804]: NETFILTER_CFG table=nat:126 family=2 entries=36 op=nft_register_chain pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:23.478000 audit[5804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffe2a6de90 a2=0 a3=1 items=0 ppid=3059 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:23.482630 kernel: kauditd_printk_skb: 243 callbacks suppressed Sep 13 00:06:23.482772 kernel: audit: type=1300 audit(1757721983.478:1551): arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffe2a6de90 a2=0 a3=1 items=0 ppid=3059 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:23.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:23.509845 kernel: audit: type=1327 audit(1757721983.478:1551): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:23.639000 audit[5699]: AVC avc: denied { watch } for pid=5699 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_05_51.3223640934/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c458 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c458 tclass=file permissive=0 Sep 13 00:06:23.639000 audit[5699]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000f4c500 a2=fc6 a3=0 items=0 ppid=4948 pid=5699 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c458 key=(null) Sep 13 00:06:23.670731 kernel: audit: type=1400 audit(1757721983.639:1552): avc: denied { watch } for pid=5699 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_05_51.3223640934/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c458 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c458 tclass=file permissive=0 Sep 13 00:06:23.670935 kernel: audit: type=1300 audit(1757721983.639:1552): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000f4c500 a2=fc6 a3=0 items=0 ppid=4948 pid=5699 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c458 key=(null) Sep 13 00:06:23.639000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:06:23.683474 kernel: audit: type=1327 audit(1757721983.639:1552): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:06:24.084896 env[1800]: time="2025-09-13T00:06:24.084829895Z" level=info msg="StopContainer for \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\" with timeout 30 (s)" Sep 13 00:06:24.091439 env[1800]: time="2025-09-13T00:06:24.091384969Z" level=info msg="Stop container \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\" with signal terminated" Sep 13 00:06:24.199000 audit[5806]: NETFILTER_CFG table=filter:127 family=2 entries=10 op=nft_register_rule pid=5806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:24.199000 audit[5806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe18efa00 a2=0 a3=1 items=0 ppid=3059 pid=5806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:24.208643 kernel: audit: type=1325 audit(1757721984.199:1553): table=filter:127 family=2 entries=10 op=nft_register_rule pid=5806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:24.223561 kernel: audit: type=1300 audit(1757721984.199:1553): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe18efa00 a2=0 a3=1 items=0 ppid=3059 pid=5806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:24.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:24.230000 audit[5806]: NETFILTER_CFG table=nat:128 family=2 entries=42 op=nft_register_chain pid=5806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:24.232729 kernel: audit: type=1327 audit(1757721984.199:1553): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:24.230000 audit[5806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13892 a0=3 a1=ffffe18efa00 a2=0 a3=1 items=0 ppid=3059 pid=5806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:24.250456 kernel: audit: type=1325 audit(1757721984.230:1554): table=nat:128 family=2 entries=42 op=nft_register_chain pid=5806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:24.250606 kernel: audit: type=1300 audit(1757721984.230:1554): arch=c00000b7 syscall=211 success=yes exit=13892 a0=3 a1=ffffe18efa00 a2=0 a3=1 items=0 ppid=3059 pid=5806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:24.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:24.257501 systemd[1]: cri-containerd-3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652.scope: Deactivated successfully. Sep 13 00:06:24.258099 systemd[1]: cri-containerd-3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652.scope: Consumed 1.207s CPU time. Sep 13 00:06:24.256000 audit: BPF prog-id=235 op=UNLOAD Sep 13 00:06:24.260000 audit: BPF prog-id=238 op=UNLOAD Sep 13 00:06:24.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.21:22-139.178.89.65:37420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:24.273926 systemd[1]: Started sshd@12-172.31.27.21:22-139.178.89.65:37420.service. Sep 13 00:06:24.354843 env[1800]: time="2025-09-13T00:06:24.353746522Z" level=info msg="shim disconnected" id=3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652 Sep 13 00:06:24.355311 env[1800]: time="2025-09-13T00:06:24.355244316Z" level=warning msg="cleaning up after shim disconnected" id=3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652 namespace=k8s.io Sep 13 00:06:24.355487 env[1800]: time="2025-09-13T00:06:24.355454425Z" level=info msg="cleaning up dead shim" Sep 13 00:06:24.365993 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652-rootfs.mount: Deactivated successfully. Sep 13 00:06:24.388474 env[1800]: time="2025-09-13T00:06:24.388413929Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:06:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5830 runtime=io.containerd.runc.v2\n" Sep 13 00:06:24.495254 env[1800]: time="2025-09-13T00:06:24.495195787Z" level=info msg="StopContainer for \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\" returns successfully" Sep 13 00:06:24.496461 env[1800]: time="2025-09-13T00:06:24.496410025Z" level=info msg="StopPodSandbox for \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\"" Sep 13 00:06:24.496790 env[1800]: time="2025-09-13T00:06:24.496750770Z" level=info msg="Container to stop \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Sep 13 00:06:24.496000 audit[5816]: USER_ACCT pid=5816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:24.501229 sshd[5816]: Accepted publickey for core from 139.178.89.65 port 37420 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:24.501000 audit[5816]: CRED_ACQ pid=5816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:24.501000 audit[5816]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbc63be0 a2=3 a3=1 items=0 ppid=1 pid=5816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:24.501000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:24.505882 sshd[5816]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:24.506748 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda-shm.mount: Deactivated successfully. Sep 13 00:06:24.519759 systemd[1]: Started session-13.scope. Sep 13 00:06:24.521202 systemd-logind[1793]: New session 13 of user core. Sep 13 00:06:24.535000 audit[5816]: USER_START pid=5816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:24.538000 audit[5844]: CRED_ACQ pid=5844 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:24.548993 systemd[1]: cri-containerd-0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda.scope: Deactivated successfully. Sep 13 00:06:24.547000 audit: BPF prog-id=195 op=UNLOAD Sep 13 00:06:24.551000 audit: BPF prog-id=198 op=UNLOAD Sep 13 00:06:24.595903 env[1800]: time="2025-09-13T00:06:24.595828292Z" level=info msg="shim disconnected" id=0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda Sep 13 00:06:24.596650 env[1800]: time="2025-09-13T00:06:24.596601938Z" level=warning msg="cleaning up after shim disconnected" id=0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda namespace=k8s.io Sep 13 00:06:24.596820 env[1800]: time="2025-09-13T00:06:24.596790759Z" level=info msg="cleaning up dead shim" Sep 13 00:06:24.600254 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda-rootfs.mount: Deactivated successfully. Sep 13 00:06:24.625439 env[1800]: time="2025-09-13T00:06:24.625185976Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:06:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5864 runtime=io.containerd.runc.v2\n" Sep 13 00:06:24.826948 systemd-networkd[1518]: cali5e60fccd889: Link DOWN Sep 13 00:06:24.826968 systemd-networkd[1518]: cali5e60fccd889: Lost carrier Sep 13 00:06:24.891295 sshd[5816]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:24.892000 audit[5816]: USER_END pid=5816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:24.892000 audit[5816]: CRED_DISP pid=5816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:24.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.21:22-139.178.89.65:37420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:24.896851 systemd[1]: sshd@12-172.31.27.21:22-139.178.89.65:37420.service: Deactivated successfully. Sep 13 00:06:24.898461 systemd[1]: session-13.scope: Deactivated successfully. Sep 13 00:06:24.900436 systemd-logind[1793]: Session 13 logged out. Waiting for processes to exit. Sep 13 00:06:24.903466 systemd-logind[1793]: Removed session 13. Sep 13 00:06:24.931000 audit[5917]: NETFILTER_CFG table=filter:129 family=2 entries=59 op=nft_register_rule pid=5917 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:24.931000 audit[5917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10132 a0=3 a1=ffffcfd1f000 a2=0 a3=ffff9b2a5fa8 items=0 ppid=4345 pid=5917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:24.931000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:24.932000 audit[5917]: NETFILTER_CFG table=filter:130 family=2 entries=2 op=nft_unregister_chain pid=5917 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:24.932000 audit[5917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffcfd1f000 a2=0 a3=ffff9b2a5fa8 items=0 ppid=4345 pid=5917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:24.932000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.821 [INFO][5893] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.821 [INFO][5893] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" iface="eth0" netns="/var/run/netns/cni-1b2fff5b-2cf5-40b8-42c3-d666303b24b2" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.822 [INFO][5893] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" iface="eth0" netns="/var/run/netns/cni-1b2fff5b-2cf5-40b8-42c3-d666303b24b2" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.856 [INFO][5893] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" after=35.233476ms iface="eth0" netns="/var/run/netns/cni-1b2fff5b-2cf5-40b8-42c3-d666303b24b2" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.857 [INFO][5893] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.857 [INFO][5893] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.956 [INFO][5907] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.956 [INFO][5907] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:24.957 [INFO][5907] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:25.042 [INFO][5907] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:25.043 [INFO][5907] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:25.045 [INFO][5907] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:25.052300 env[1800]: 2025-09-13 00:06:25.048 [INFO][5893] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:06:25.053840 env[1800]: time="2025-09-13T00:06:25.053785046Z" level=info msg="TearDown network for sandbox \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\" successfully" Sep 13 00:06:25.054017 env[1800]: time="2025-09-13T00:06:25.053981571Z" level=info msg="StopPodSandbox for \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\" returns successfully" Sep 13 00:06:25.064867 env[1800]: time="2025-09-13T00:06:25.064813694Z" level=info msg="StopPodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\"" Sep 13 00:06:25.065604 systemd[1]: run-netns-cni\x2d1b2fff5b\x2d2cf5\x2d40b8\x2d42c3\x2dd666303b24b2.mount: Deactivated successfully. Sep 13 00:06:25.086440 kubelet[2910]: I0913 00:06:25.086342 2910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.155 [WARNING][5928] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0", GenerateName:"calico-apiserver-f8688475b-", Namespace:"calico-apiserver", SelfLink:"", UID:"a8be4b28-8b5c-4ca5-b13d-63f217abdcee", ResourceVersion:"1293", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f8688475b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda", Pod:"calico-apiserver-f8688475b-gfns6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5e60fccd889", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.155 [INFO][5928] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.155 [INFO][5928] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" iface="eth0" netns="" Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.155 [INFO][5928] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.155 [INFO][5928] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.226 [INFO][5935] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.228 [INFO][5935] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.229 [INFO][5935] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.248 [WARNING][5935] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.248 [INFO][5935] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.252 [INFO][5935] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:25.258152 env[1800]: 2025-09-13 00:06:25.255 [INFO][5928] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:06:25.260008 env[1800]: time="2025-09-13T00:06:25.258210821Z" level=info msg="TearDown network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" successfully" Sep 13 00:06:25.260008 env[1800]: time="2025-09-13T00:06:25.258337870Z" level=info msg="StopPodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" returns successfully" Sep 13 00:06:25.324000 audit[5942]: NETFILTER_CFG table=filter:131 family=2 entries=10 op=nft_register_rule pid=5942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:25.324000 audit[5942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff7dc8600 a2=0 a3=1 items=0 ppid=3059 pid=5942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:25.330000 audit[5942]: NETFILTER_CFG table=nat:132 family=2 entries=42 op=nft_unregister_chain pid=5942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:25.330000 audit[5942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12132 a0=3 a1=fffff7dc8600 a2=0 a3=1 items=0 ppid=3059 pid=5942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:25.420734 kubelet[2910]: I0913 00:06:25.420655 2910 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-fz7rn\" (UniqueName: \"kubernetes.io/projected/a8be4b28-8b5c-4ca5-b13d-63f217abdcee-kube-api-access-fz7rn\") pod \"a8be4b28-8b5c-4ca5-b13d-63f217abdcee\" (UID: \"a8be4b28-8b5c-4ca5-b13d-63f217abdcee\") " Sep 13 00:06:25.420992 kubelet[2910]: I0913 00:06:25.420763 2910 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a8be4b28-8b5c-4ca5-b13d-63f217abdcee-calico-apiserver-certs\") pod \"a8be4b28-8b5c-4ca5-b13d-63f217abdcee\" (UID: \"a8be4b28-8b5c-4ca5-b13d-63f217abdcee\") " Sep 13 00:06:25.433809 kubelet[2910]: I0913 00:06:25.433733 2910 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/a8be4b28-8b5c-4ca5-b13d-63f217abdcee-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "a8be4b28-8b5c-4ca5-b13d-63f217abdcee" (UID: "a8be4b28-8b5c-4ca5-b13d-63f217abdcee"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 13 00:06:25.449733 systemd[1]: var-lib-kubelet-pods-a8be4b28\x2d8b5c\x2d4ca5\x2db13d\x2d63f217abdcee-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dfz7rn.mount: Deactivated successfully. Sep 13 00:06:25.450068 systemd[1]: var-lib-kubelet-pods-a8be4b28\x2d8b5c\x2d4ca5\x2db13d\x2d63f217abdcee-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. Sep 13 00:06:25.465106 kubelet[2910]: I0913 00:06:25.461917 2910 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a8be4b28-8b5c-4ca5-b13d-63f217abdcee-kube-api-access-fz7rn" (OuterVolumeSpecName: "kube-api-access-fz7rn") pod "a8be4b28-8b5c-4ca5-b13d-63f217abdcee" (UID: "a8be4b28-8b5c-4ca5-b13d-63f217abdcee"). InnerVolumeSpecName "kube-api-access-fz7rn". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 13 00:06:25.521480 kubelet[2910]: I0913 00:06:25.521310 2910 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a8be4b28-8b5c-4ca5-b13d-63f217abdcee-calico-apiserver-certs\") on node \"ip-172-31-27-21\" DevicePath \"\"" Sep 13 00:06:25.521480 kubelet[2910]: I0913 00:06:25.521364 2910 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-fz7rn\" (UniqueName: \"kubernetes.io/projected/a8be4b28-8b5c-4ca5-b13d-63f217abdcee-kube-api-access-fz7rn\") on node \"ip-172-31-27-21\" DevicePath \"\"" Sep 13 00:06:25.708389 env[1800]: time="2025-09-13T00:06:25.708322148Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:25.713047 env[1800]: time="2025-09-13T00:06:25.712988244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:34117caf92350e1565610f2254377d7455b11e36666b5ce11b4a13670720432a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:25.717306 env[1800]: time="2025-09-13T00:06:25.717251929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:25.720613 env[1800]: time="2025-09-13T00:06:25.720560164Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:27c4187717f08f0a5727019d8beb7597665eb47e69eaa1d7d091a7e28913e577,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:25.721750 env[1800]: time="2025-09-13T00:06:25.721681061Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.3\" returns image reference \"sha256:34117caf92350e1565610f2254377d7455b11e36666b5ce11b4a13670720432a\"" Sep 13 00:06:25.729176 env[1800]: time="2025-09-13T00:06:25.729088854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:06:25.766427 env[1800]: time="2025-09-13T00:06:25.766154711Z" level=info msg="CreateContainer within sandbox \"27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Sep 13 00:06:25.802836 env[1800]: time="2025-09-13T00:06:25.802612800Z" level=info msg="CreateContainer within sandbox \"27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"0c6a8092f464d33788044f39de246d40aa18d3f10dc3c7ba13aa89070aa040d9\"" Sep 13 00:06:25.804597 env[1800]: time="2025-09-13T00:06:25.804480741Z" level=info msg="StartContainer for \"0c6a8092f464d33788044f39de246d40aa18d3f10dc3c7ba13aa89070aa040d9\"" Sep 13 00:06:25.849234 systemd[1]: Started cri-containerd-0c6a8092f464d33788044f39de246d40aa18d3f10dc3c7ba13aa89070aa040d9.scope. Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.902000 audit: BPF prog-id=242 op=LOAD Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c7b38 a2=10 a3=0 items=0 ppid=5230 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063366138303932663436346433333738383034346633396465323436 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=5230 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063366138303932663436346433333738383034346633396465323436 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit: BPF prog-id=243 op=LOAD Sep 13 00:06:25.903000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c78e0 a2=78 a3=0 items=0 ppid=5230 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063366138303932663436346433333738383034346633396465323436 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.903000 audit: BPF prog-id=244 op=LOAD Sep 13 00:06:25.903000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c7670 a2=78 a3=0 items=0 ppid=5230 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063366138303932663436346433333738383034346633396465323436 Sep 13 00:06:25.904000 audit: BPF prog-id=244 op=UNLOAD Sep 13 00:06:25.904000 audit: BPF prog-id=243 op=UNLOAD Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:25.904000 audit: BPF prog-id=245 op=LOAD Sep 13 00:06:25.904000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c7b40 a2=78 a3=0 items=0 ppid=5230 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:25.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063366138303932663436346433333738383034346633396465323436 Sep 13 00:06:25.955565 env[1800]: time="2025-09-13T00:06:25.955432097Z" level=info msg="StartContainer for \"0c6a8092f464d33788044f39de246d40aa18d3f10dc3c7ba13aa89070aa040d9\" returns successfully" Sep 13 00:06:26.118637 systemd[1]: Removed slice kubepods-besteffort-poda8be4b28_8b5c_4ca5_b13d_63f217abdcee.slice. Sep 13 00:06:26.118871 systemd[1]: kubepods-besteffort-poda8be4b28_8b5c_4ca5_b13d_63f217abdcee.slice: Consumed 1.280s CPU time. Sep 13 00:06:26.168318 kubelet[2910]: I0913 00:06:26.167103 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-68d596d8c-6g75b" podStartSLOduration=30.199940018 podStartE2EDuration="46.167046823s" podCreationTimestamp="2025-09-13 00:05:40 +0000 UTC" firstStartedPulling="2025-09-13 00:06:09.757176929 +0000 UTC m=+67.688414446" lastFinishedPulling="2025-09-13 00:06:25.724283734 +0000 UTC m=+83.655521251" observedRunningTime="2025-09-13 00:06:26.141011564 +0000 UTC m=+84.072249093" watchObservedRunningTime="2025-09-13 00:06:26.167046823 +0000 UTC m=+84.098284364" Sep 13 00:06:26.355000 audit[6017]: NETFILTER_CFG table=filter:133 family=2 entries=10 op=nft_register_rule pid=6017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:26.355000 audit[6017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffffa5e50a0 a2=0 a3=1 items=0 ppid=3059 pid=6017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:26.362000 audit[6017]: NETFILTER_CFG table=nat:134 family=2 entries=38 op=nft_register_rule pid=6017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:26.362000 audit[6017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=fffffa5e50a0 a2=0 a3=1 items=0 ppid=3059 pid=6017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:26.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:26.408349 kubelet[2910]: I0913 00:06:26.407554 2910 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a8be4b28-8b5c-4ca5-b13d-63f217abdcee" path="/var/lib/kubelet/pods/a8be4b28-8b5c-4ca5-b13d-63f217abdcee/volumes" Sep 13 00:06:26.439278 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3157023868.mount: Deactivated successfully. Sep 13 00:06:27.198553 systemd[1]: run-containerd-runc-k8s.io-0c6a8092f464d33788044f39de246d40aa18d3f10dc3c7ba13aa89070aa040d9-runc.D9HqEQ.mount: Deactivated successfully. Sep 13 00:06:27.456228 env[1800]: time="2025-09-13T00:06:27.456031720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:27.460311 env[1800]: time="2025-09-13T00:06:27.460245557Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:27.468102 env[1800]: time="2025-09-13T00:06:27.468039327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:27.470271 env[1800]: time="2025-09-13T00:06:27.470199061Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:06:27.473099 env[1800]: time="2025-09-13T00:06:27.471989538Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 13 00:06:27.483093 env[1800]: time="2025-09-13T00:06:27.483021583Z" level=info msg="CreateContainer within sandbox \"826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:06:27.516841 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3840598342.mount: Deactivated successfully. Sep 13 00:06:27.519461 env[1800]: time="2025-09-13T00:06:27.519349563Z" level=info msg="CreateContainer within sandbox \"826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c5bbf876a04d354a2266a1085dd5d6ed0f23af4e2be484b2b5244dd80d75884d\"" Sep 13 00:06:27.523609 env[1800]: time="2025-09-13T00:06:27.520763139Z" level=info msg="StartContainer for \"c5bbf876a04d354a2266a1085dd5d6ed0f23af4e2be484b2b5244dd80d75884d\"" Sep 13 00:06:27.592124 systemd[1]: run-containerd-runc-k8s.io-c5bbf876a04d354a2266a1085dd5d6ed0f23af4e2be484b2b5244dd80d75884d-runc.FLJUfW.mount: Deactivated successfully. Sep 13 00:06:27.597260 systemd[1]: Started cri-containerd-c5bbf876a04d354a2266a1085dd5d6ed0f23af4e2be484b2b5244dd80d75884d.scope. Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=5168 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:27.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626266383736613034643335346132323636613130383564643564 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit: BPF prog-id=246 op=LOAD Sep 13 00:06:27.651000 audit[6049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=5168 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:27.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626266383736613034643335346132323636613130383564643564 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit: BPF prog-id=247 op=LOAD Sep 13 00:06:27.651000 audit[6049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=5168 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:27.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626266383736613034643335346132323636613130383564643564 Sep 13 00:06:27.651000 audit: BPF prog-id=247 op=UNLOAD Sep 13 00:06:27.651000 audit: BPF prog-id=246 op=UNLOAD Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:06:27.651000 audit: BPF prog-id=248 op=LOAD Sep 13 00:06:27.651000 audit[6049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=5168 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:27.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335626266383736613034643335346132323636613130383564643564 Sep 13 00:06:27.683268 env[1800]: time="2025-09-13T00:06:27.683179788Z" level=info msg="StartContainer for \"c5bbf876a04d354a2266a1085dd5d6ed0f23af4e2be484b2b5244dd80d75884d\" returns successfully" Sep 13 00:06:28.600073 kubelet[2910]: I0913 00:06:28.600036 2910 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:06:28.600766 kubelet[2910]: I0913 00:06:28.600742 2910 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:06:29.922328 systemd[1]: Started sshd@13-172.31.27.21:22-139.178.89.65:58736.service. Sep 13 00:06:29.925875 kernel: kauditd_printk_skb: 134 callbacks suppressed Sep 13 00:06:29.926170 kernel: audit: type=1130 audit(1757721989.922:1598): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.21:22-139.178.89.65:58736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:29.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.21:22-139.178.89.65:58736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:30.118000 audit[6089]: USER_ACCT pid=6089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.119219 sshd[6089]: Accepted publickey for core from 139.178.89.65 port 58736 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:30.130000 audit[6089]: CRED_ACQ pid=6089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.132891 sshd[6089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:30.141141 kernel: audit: type=1101 audit(1757721990.118:1599): pid=6089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.141260 kernel: audit: type=1103 audit(1757721990.130:1600): pid=6089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.148210 kernel: audit: type=1006 audit(1757721990.131:1601): pid=6089 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Sep 13 00:06:30.131000 audit[6089]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc83fb080 a2=3 a3=1 items=0 ppid=1 pid=6089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:30.148673 systemd-logind[1793]: New session 14 of user core. Sep 13 00:06:30.150043 systemd[1]: Started session-14.scope. Sep 13 00:06:30.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:30.166581 kernel: audit: type=1300 audit(1757721990.131:1601): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc83fb080 a2=3 a3=1 items=0 ppid=1 pid=6089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:30.166721 kernel: audit: type=1327 audit(1757721990.131:1601): proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:30.162000 audit[6089]: USER_START pid=6089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.166000 audit[6093]: CRED_ACQ pid=6093 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.189493 kernel: audit: type=1105 audit(1757721990.162:1602): pid=6089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.189676 kernel: audit: type=1103 audit(1757721990.166:1603): pid=6093 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.443369 sshd[6089]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:30.445000 audit[6089]: USER_END pid=6089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.445000 audit[6089]: CRED_DISP pid=6089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.457897 systemd[1]: sshd@13-172.31.27.21:22-139.178.89.65:58736.service: Deactivated successfully. Sep 13 00:06:30.459214 systemd[1]: session-14.scope: Deactivated successfully. Sep 13 00:06:30.467058 kernel: audit: type=1106 audit(1757721990.445:1604): pid=6089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.467216 kernel: audit: type=1104 audit(1757721990.445:1605): pid=6089 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:30.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.21:22-139.178.89.65:58736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:30.472129 systemd-logind[1793]: Session 14 logged out. Waiting for processes to exit. Sep 13 00:06:30.474093 systemd-logind[1793]: Removed session 14. Sep 13 00:06:31.820420 systemd[1]: run-containerd-runc-k8s.io-0c8c72498f450532041009ee4e2c4bccc4b9b22ecdb541323e57165ec85cce4e-runc.LMnAUI.mount: Deactivated successfully. Sep 13 00:06:35.472806 systemd[1]: Started sshd@14-172.31.27.21:22-139.178.89.65:58742.service. Sep 13 00:06:35.476701 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:06:35.476907 kernel: audit: type=1130 audit(1757721995.473:1607): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.21:22-139.178.89.65:58742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:35.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.21:22-139.178.89.65:58742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:35.666000 audit[6131]: USER_ACCT pid=6131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:35.668702 sshd[6131]: Accepted publickey for core from 139.178.89.65 port 58742 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:35.675162 sshd[6131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:35.672000 audit[6131]: CRED_ACQ pid=6131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:35.687961 kernel: audit: type=1101 audit(1757721995.666:1608): pid=6131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:35.688100 kernel: audit: type=1103 audit(1757721995.672:1609): pid=6131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:35.694763 kernel: audit: type=1006 audit(1757721995.672:1610): pid=6131 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Sep 13 00:06:35.672000 audit[6131]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffbfb1130 a2=3 a3=1 items=0 ppid=1 pid=6131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:35.704866 kernel: audit: type=1300 audit(1757721995.672:1610): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffbfb1130 a2=3 a3=1 items=0 ppid=1 pid=6131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:35.707404 kernel: audit: type=1327 audit(1757721995.672:1610): proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:35.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:35.710583 systemd-logind[1793]: New session 15 of user core. Sep 13 00:06:35.711428 systemd[1]: Started session-15.scope. Sep 13 00:06:35.726000 audit[6131]: USER_START pid=6131 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:35.738000 audit[6133]: CRED_ACQ pid=6133 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:35.750085 kernel: audit: type=1105 audit(1757721995.726:1611): pid=6131 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:35.750213 kernel: audit: type=1103 audit(1757721995.738:1612): pid=6133 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:36.007218 sshd[6131]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:36.008000 audit[6131]: USER_END pid=6131 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:36.012891 systemd[1]: session-15.scope: Deactivated successfully. Sep 13 00:06:36.014044 systemd[1]: sshd@14-172.31.27.21:22-139.178.89.65:58742.service: Deactivated successfully. Sep 13 00:06:36.008000 audit[6131]: CRED_DISP pid=6131 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:36.032018 kernel: audit: type=1106 audit(1757721996.008:1613): pid=6131 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:36.032169 kernel: audit: type=1104 audit(1757721996.008:1614): pid=6131 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:36.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.21:22-139.178.89.65:58742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:36.032553 systemd-logind[1793]: Session 15 logged out. Waiting for processes to exit. Sep 13 00:06:36.034578 systemd-logind[1793]: Removed session 15. Sep 13 00:06:38.020098 systemd[1]: run-containerd-runc-k8s.io-0c6a8092f464d33788044f39de246d40aa18d3f10dc3c7ba13aa89070aa040d9-runc.6PvYXV.mount: Deactivated successfully. Sep 13 00:06:41.039770 systemd[1]: Started sshd@15-172.31.27.21:22-139.178.89.65:36680.service. Sep 13 00:06:41.054643 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:06:41.054832 kernel: audit: type=1130 audit(1757722001.038:1616): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.21:22-139.178.89.65:36680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:41.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.21:22-139.178.89.65:36680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:41.254000 audit[6164]: USER_ACCT pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.255989 sshd[6164]: Accepted publickey for core from 139.178.89.65 port 36680 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:41.266000 audit[6164]: CRED_ACQ pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.268776 kernel: audit: type=1101 audit(1757722001.254:1617): pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.269483 sshd[6164]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:41.285970 kernel: audit: type=1103 audit(1757722001.266:1618): pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.286121 kernel: audit: type=1006 audit(1757722001.266:1619): pid=6164 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Sep 13 00:06:41.266000 audit[6164]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3e2b6b0 a2=3 a3=1 items=0 ppid=1 pid=6164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:41.266000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:41.302085 kernel: audit: type=1300 audit(1757722001.266:1619): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3e2b6b0 a2=3 a3=1 items=0 ppid=1 pid=6164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:41.302255 kernel: audit: type=1327 audit(1757722001.266:1619): proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:41.309569 systemd-logind[1793]: New session 16 of user core. Sep 13 00:06:41.311116 systemd[1]: Started session-16.scope. Sep 13 00:06:41.320000 audit[6164]: USER_START pid=6164 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.334000 audit[6166]: CRED_ACQ pid=6166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.346574 kernel: audit: type=1105 audit(1757722001.320:1620): pid=6164 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.346764 kernel: audit: type=1103 audit(1757722001.334:1621): pid=6166 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.633895 sshd[6164]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:41.635000 audit[6164]: USER_END pid=6164 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.651974 systemd[1]: sshd@15-172.31.27.21:22-139.178.89.65:36680.service: Deactivated successfully. Sep 13 00:06:41.653493 systemd[1]: session-16.scope: Deactivated successfully. Sep 13 00:06:41.654571 systemd-logind[1793]: Session 16 logged out. Waiting for processes to exit. Sep 13 00:06:41.646000 audit[6164]: CRED_DISP pid=6164 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.658642 kernel: audit: type=1106 audit(1757722001.635:1622): pid=6164 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:41.658885 systemd-logind[1793]: Removed session 16. Sep 13 00:06:41.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.21:22-139.178.89.65:36680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:41.670618 kernel: audit: type=1104 audit(1757722001.646:1623): pid=6164 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:46.365000 audit[6177]: NETFILTER_CFG table=filter:135 family=2 entries=10 op=nft_register_rule pid=6177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:46.369738 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:06:46.369942 kernel: audit: type=1325 audit(1757722006.365:1625): table=filter:135 family=2 entries=10 op=nft_register_rule pid=6177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:46.365000 audit[6177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffdd60e920 a2=0 a3=1 items=0 ppid=3059 pid=6177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.387491 kernel: audit: type=1300 audit(1757722006.365:1625): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffdd60e920 a2=0 a3=1 items=0 ppid=3059 pid=6177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:46.394206 kernel: audit: type=1327 audit(1757722006.365:1625): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:46.377000 audit[6177]: NETFILTER_CFG table=nat:136 family=2 entries=38 op=nft_register_rule pid=6177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:46.400864 kernel: audit: type=1325 audit(1757722006.377:1626): table=nat:136 family=2 entries=38 op=nft_register_rule pid=6177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:46.377000 audit[6177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffdd60e920 a2=0 a3=1 items=0 ppid=3059 pid=6177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.413167 kernel: audit: type=1300 audit(1757722006.377:1626): arch=c00000b7 syscall=211 success=yes exit=12004 a0=3 a1=ffffdd60e920 a2=0 a3=1 items=0 ppid=3059 pid=6177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:46.420411 kernel: audit: type=1327 audit(1757722006.377:1626): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:46.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.21:22-139.178.89.65:36690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:46.662892 systemd[1]: Started sshd@16-172.31.27.21:22-139.178.89.65:36690.service. Sep 13 00:06:46.673649 kernel: audit: type=1130 audit(1757722006.661:1627): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.21:22-139.178.89.65:36690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:46.862000 audit[6179]: USER_ACCT pid=6179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:46.863755 sshd[6179]: Accepted publickey for core from 139.178.89.65 port 36690 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:46.867500 sshd[6179]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:46.865000 audit[6179]: CRED_ACQ pid=6179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:46.881674 systemd[1]: Started session-17.scope. Sep 13 00:06:46.884582 kernel: audit: type=1101 audit(1757722006.862:1628): pid=6179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:46.884769 kernel: audit: type=1103 audit(1757722006.865:1629): pid=6179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:46.884823 kernel: audit: type=1006 audit(1757722006.865:1630): pid=6179 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Sep 13 00:06:46.884993 systemd-logind[1793]: New session 17 of user core. Sep 13 00:06:46.865000 audit[6179]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd465f580 a2=3 a3=1 items=0 ppid=1 pid=6179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:46.865000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:46.900000 audit[6179]: USER_START pid=6179 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:46.904000 audit[6181]: CRED_ACQ pid=6181 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:47.202908 sshd[6179]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:47.205000 audit[6179]: USER_END pid=6179 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:47.205000 audit[6179]: CRED_DISP pid=6179 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:47.208132 systemd[1]: session-17.scope: Deactivated successfully. Sep 13 00:06:47.209292 systemd[1]: sshd@16-172.31.27.21:22-139.178.89.65:36690.service: Deactivated successfully. Sep 13 00:06:47.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.21:22-139.178.89.65:36690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:47.211267 systemd-logind[1793]: Session 17 logged out. Waiting for processes to exit. Sep 13 00:06:47.214450 systemd-logind[1793]: Removed session 17. Sep 13 00:06:47.229497 systemd[1]: Started sshd@17-172.31.27.21:22-139.178.89.65:36698.service. Sep 13 00:06:47.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.27.21:22-139.178.89.65:36698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:47.409000 audit[6190]: USER_ACCT pid=6190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:47.410673 sshd[6190]: Accepted publickey for core from 139.178.89.65 port 36698 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:47.412000 audit[6190]: CRED_ACQ pid=6190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:47.412000 audit[6190]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca3342e0 a2=3 a3=1 items=0 ppid=1 pid=6190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:47.412000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:47.413895 sshd[6190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:47.423297 systemd-logind[1793]: New session 18 of user core. Sep 13 00:06:47.424194 systemd[1]: Started session-18.scope. Sep 13 00:06:47.435000 audit[6190]: USER_START pid=6190 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:47.438000 audit[6192]: CRED_ACQ pid=6192 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:48.066046 sshd[6190]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:48.068000 audit[6190]: USER_END pid=6190 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:48.069000 audit[6190]: CRED_DISP pid=6190 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:48.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.27.21:22-139.178.89.65:36698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:48.072565 systemd[1]: sshd@17-172.31.27.21:22-139.178.89.65:36698.service: Deactivated successfully. Sep 13 00:06:48.074215 systemd[1]: session-18.scope: Deactivated successfully. Sep 13 00:06:48.077324 systemd-logind[1793]: Session 18 logged out. Waiting for processes to exit. Sep 13 00:06:48.080355 systemd-logind[1793]: Removed session 18. Sep 13 00:06:48.099625 systemd[1]: Started sshd@18-172.31.27.21:22-139.178.89.65:36700.service. Sep 13 00:06:48.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.27.21:22-139.178.89.65:36700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:48.290777 sshd[6201]: Accepted publickey for core from 139.178.89.65 port 36700 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:48.290000 audit[6201]: USER_ACCT pid=6201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:48.292000 audit[6201]: CRED_ACQ pid=6201 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:48.292000 audit[6201]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa5a16f0 a2=3 a3=1 items=0 ppid=1 pid=6201 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:48.292000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:48.294209 sshd[6201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:48.304811 systemd-logind[1793]: New session 19 of user core. Sep 13 00:06:48.305959 systemd[1]: Started session-19.scope. Sep 13 00:06:48.317000 audit[6201]: USER_START pid=6201 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:48.320000 audit[6203]: CRED_ACQ pid=6203 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:48.809737 kubelet[2910]: I0913 00:06:48.809629 2910 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6tbpg" podStartSLOduration=51.688923644 podStartE2EDuration="1m9.809579296s" podCreationTimestamp="2025-09-13 00:05:39 +0000 UTC" firstStartedPulling="2025-09-13 00:06:09.353741575 +0000 UTC m=+67.284979092" lastFinishedPulling="2025-09-13 00:06:27.474397239 +0000 UTC m=+85.405634744" observedRunningTime="2025-09-13 00:06:28.13040796 +0000 UTC m=+86.061645501" watchObservedRunningTime="2025-09-13 00:06:48.809579296 +0000 UTC m=+106.740816825" Sep 13 00:06:48.812843 env[1800]: time="2025-09-13T00:06:48.812299832Z" level=info msg="StopContainer for \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\" with timeout 30 (s)" Sep 13 00:06:48.813497 env[1800]: time="2025-09-13T00:06:48.812945554Z" level=info msg="Stop container \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\" with signal terminated" Sep 13 00:06:48.909975 systemd[1]: cri-containerd-bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901.scope: Deactivated successfully. Sep 13 00:06:48.910769 systemd[1]: cri-containerd-bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901.scope: Consumed 1.943s CPU time. Sep 13 00:06:48.910000 audit: BPF prog-id=219 op=UNLOAD Sep 13 00:06:48.926000 audit: BPF prog-id=222 op=UNLOAD Sep 13 00:06:48.979000 audit[6226]: NETFILTER_CFG table=filter:137 family=2 entries=10 op=nft_register_rule pid=6226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:48.979000 audit[6226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffff6e03a10 a2=0 a3=1 items=0 ppid=3059 pid=6226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:48.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:48.986163 env[1800]: time="2025-09-13T00:06:48.985883508Z" level=info msg="shim disconnected" id=bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901 Sep 13 00:06:48.986163 env[1800]: time="2025-09-13T00:06:48.985951834Z" level=warning msg="cleaning up after shim disconnected" id=bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901 namespace=k8s.io Sep 13 00:06:48.986163 env[1800]: time="2025-09-13T00:06:48.985972761Z" level=info msg="cleaning up dead shim" Sep 13 00:06:48.988727 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901-rootfs.mount: Deactivated successfully. Sep 13 00:06:49.006000 audit[6226]: NETFILTER_CFG table=nat:138 family=2 entries=42 op=nft_register_chain pid=6226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:49.006000 audit[6226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13892 a0=3 a1=fffff6e03a10 a2=0 a3=1 items=0 ppid=3059 pid=6226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:49.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:49.079635 env[1800]: time="2025-09-13T00:06:49.078310782Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:06:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6230 runtime=io.containerd.runc.v2\n" Sep 13 00:06:49.093065 systemd[1]: run-containerd-runc-k8s.io-9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b-runc.NO9tky.mount: Deactivated successfully. Sep 13 00:06:49.119000 audit[6252]: NETFILTER_CFG table=filter:139 family=2 entries=10 op=nft_register_rule pid=6252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:49.146930 env[1800]: time="2025-09-13T00:06:49.146864370Z" level=info msg="StopContainer for \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\" returns successfully" Sep 13 00:06:49.151280 env[1800]: time="2025-09-13T00:06:49.151227268Z" level=info msg="StopPodSandbox for \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\"" Sep 13 00:06:49.151625 env[1800]: time="2025-09-13T00:06:49.151585036Z" level=info msg="Container to stop \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Sep 13 00:06:49.162447 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c-shm.mount: Deactivated successfully. Sep 13 00:06:49.119000 audit[6252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc9e0e8e0 a2=0 a3=1 items=0 ppid=3059 pid=6252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:49.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:49.237782 systemd[1]: cri-containerd-23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c.scope: Deactivated successfully. Sep 13 00:06:49.237000 audit: BPF prog-id=159 op=UNLOAD Sep 13 00:06:49.239000 audit: BPF prog-id=162 op=UNLOAD Sep 13 00:06:49.241000 audit[6252]: NETFILTER_CFG table=nat:140 family=2 entries=42 op=nft_unregister_chain pid=6252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:49.241000 audit[6252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12132 a0=3 a1=ffffc9e0e8e0 a2=0 a3=1 items=0 ppid=3059 pid=6252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:49.241000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:49.321147 env[1800]: time="2025-09-13T00:06:49.321080210Z" level=info msg="shim disconnected" id=23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c Sep 13 00:06:49.321433 env[1800]: time="2025-09-13T00:06:49.321388816Z" level=warning msg="cleaning up after shim disconnected" id=23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c namespace=k8s.io Sep 13 00:06:49.321618 env[1800]: time="2025-09-13T00:06:49.321591153Z" level=info msg="cleaning up dead shim" Sep 13 00:06:49.355081 env[1800]: time="2025-09-13T00:06:49.354931799Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:06:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6279 runtime=io.containerd.runc.v2\n" Sep 13 00:06:49.527853 systemd-networkd[1518]: cali6359d8ef051: Link DOWN Sep 13 00:06:49.527867 systemd-networkd[1518]: cali6359d8ef051: Lost carrier Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.525 [INFO][6306] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.525 [INFO][6306] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" iface="eth0" netns="/var/run/netns/cni-49639d53-adcf-6de1-e3cc-1a5945aa5135" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.526 [INFO][6306] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" iface="eth0" netns="/var/run/netns/cni-49639d53-adcf-6de1-e3cc-1a5945aa5135" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.545 [INFO][6306] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" after=19.972469ms iface="eth0" netns="/var/run/netns/cni-49639d53-adcf-6de1-e3cc-1a5945aa5135" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.545 [INFO][6306] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.546 [INFO][6306] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.631 [INFO][6318] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.632 [INFO][6318] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.636 [INFO][6318] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.763 [INFO][6318] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.764 [INFO][6318] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.792 [INFO][6318] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:49.800705 env[1800]: 2025-09-13 00:06:49.795 [INFO][6306] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:06:49.802617 env[1800]: time="2025-09-13T00:06:49.802528812Z" level=info msg="TearDown network for sandbox \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\" successfully" Sep 13 00:06:49.802879 env[1800]: time="2025-09-13T00:06:49.802838954Z" level=info msg="StopPodSandbox for \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\" returns successfully" Sep 13 00:06:49.803884 env[1800]: time="2025-09-13T00:06:49.803812589Z" level=info msg="StopPodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\"" Sep 13 00:06:49.873152 sshd[6201]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:49.875000 audit[6201]: USER_END pid=6201 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:49.875000 audit[6201]: CRED_DISP pid=6201 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:49.879224 systemd[1]: sshd@18-172.31.27.21:22-139.178.89.65:36700.service: Deactivated successfully. Sep 13 00:06:49.880726 systemd[1]: session-19.scope: Deactivated successfully. Sep 13 00:06:49.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.27.21:22-139.178.89.65:36700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:49.882776 systemd-logind[1793]: Session 19 logged out. Waiting for processes to exit. Sep 13 00:06:49.888112 systemd-logind[1793]: Removed session 19. Sep 13 00:06:49.905868 systemd[1]: Started sshd@19-172.31.27.21:22-139.178.89.65:36704.service. Sep 13 00:06:49.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.21:22-139.178.89.65:36704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:49.994248 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c-rootfs.mount: Deactivated successfully. Sep 13 00:06:49.994534 systemd[1]: run-netns-cni\x2d49639d53\x2dadcf\x2d6de1\x2de3cc\x2d1a5945aa5135.mount: Deactivated successfully. Sep 13 00:06:50.128960 sshd[6344]: Accepted publickey for core from 139.178.89.65 port 36704 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:50.128000 audit[6344]: USER_ACCT pid=6344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:50.131000 audit[6344]: CRED_ACQ pid=6344 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:50.131000 audit[6344]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe39a7440 a2=3 a3=1 items=0 ppid=1 pid=6344 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:50.131000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:50.133202 sshd[6344]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:50.144406 systemd-logind[1793]: New session 20 of user core. Sep 13 00:06:50.145686 systemd[1]: Started session-20.scope. Sep 13 00:06:50.149000 audit[6357]: NETFILTER_CFG table=filter:141 family=2 entries=21 op=nft_register_rule pid=6357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:50.149000 audit[6357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe8033710 a2=0 a3=1 items=0 ppid=3059 pid=6357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:50.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:50.165000 audit[6344]: USER_START pid=6344 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:50.169000 audit[6361]: CRED_ACQ pid=6361 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:50.173000 audit[6357]: NETFILTER_CFG table=nat:142 family=2 entries=31 op=nft_register_chain pid=6357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:50.173000 audit[6357]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10884 a0=3 a1=ffffe8033710 a2=0 a3=1 items=0 ppid=3059 pid=6357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:50.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:49.998 [WARNING][6337] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0", GenerateName:"calico-apiserver-f8688475b-", Namespace:"calico-apiserver", SelfLink:"", UID:"86eab1aa-9333-4320-8fc8-683957d99836", ResourceVersion:"1448", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"f8688475b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c", Pod:"calico-apiserver-f8688475b-snkh7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6359d8ef051", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.001 [INFO][6337] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.001 [INFO][6337] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" iface="eth0" netns="" Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.001 [INFO][6337] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.001 [INFO][6337] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.097 [INFO][6351] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.098 [INFO][6351] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.098 [INFO][6351] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.156 [WARNING][6351] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.157 [INFO][6351] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.170 [INFO][6351] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:06:50.177982 env[1800]: 2025-09-13 00:06:50.174 [INFO][6337] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:06:50.179650 env[1800]: time="2025-09-13T00:06:50.179592940Z" level=info msg="TearDown network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" successfully" Sep 13 00:06:50.179829 env[1800]: time="2025-09-13T00:06:50.179793646Z" level=info msg="StopPodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" returns successfully" Sep 13 00:06:50.201000 audit[6362]: NETFILTER_CFG table=filter:143 family=2 entries=55 op=nft_register_rule pid=6362 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:50.201000 audit[6362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8944 a0=3 a1=fffffb727820 a2=0 a3=ffffa2675fa8 items=0 ppid=4345 pid=6362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:50.201000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:50.202000 audit[6362]: NETFILTER_CFG table=filter:144 family=2 entries=2 op=nft_unregister_chain pid=6362 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:06:50.202000 audit[6362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffffb727820 a2=0 a3=ffffa2675fa8 items=0 ppid=4345 pid=6362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:50.202000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:06:50.241342 kubelet[2910]: I0913 00:06:50.241287 2910 scope.go:117] "RemoveContainer" containerID="bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901" Sep 13 00:06:50.244602 env[1800]: time="2025-09-13T00:06:50.244548376Z" level=info msg="RemoveContainer for \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\"" Sep 13 00:06:50.253163 kubelet[2910]: I0913 00:06:50.251927 2910 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/86eab1aa-9333-4320-8fc8-683957d99836-calico-apiserver-certs\") pod \"86eab1aa-9333-4320-8fc8-683957d99836\" (UID: \"86eab1aa-9333-4320-8fc8-683957d99836\") " Sep 13 00:06:50.253163 kubelet[2910]: I0913 00:06:50.252000 2910 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-mrr5p\" (UniqueName: \"kubernetes.io/projected/86eab1aa-9333-4320-8fc8-683957d99836-kube-api-access-mrr5p\") pod \"86eab1aa-9333-4320-8fc8-683957d99836\" (UID: \"86eab1aa-9333-4320-8fc8-683957d99836\") " Sep 13 00:06:50.258238 env[1800]: time="2025-09-13T00:06:50.256687873Z" level=info msg="RemoveContainer for \"bd8c19527a5c0523172e4d7c112e405f6dc2f310c1fe37e69e4285b700a70901\" returns successfully" Sep 13 00:06:50.272380 systemd[1]: var-lib-kubelet-pods-86eab1aa\x2d9333\x2d4320\x2d8fc8\x2d683957d99836-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. Sep 13 00:06:50.279137 kubelet[2910]: I0913 00:06:50.274918 2910 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/86eab1aa-9333-4320-8fc8-683957d99836-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "86eab1aa-9333-4320-8fc8-683957d99836" (UID: "86eab1aa-9333-4320-8fc8-683957d99836"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" Sep 13 00:06:50.284733 systemd[1]: var-lib-kubelet-pods-86eab1aa\x2d9333\x2d4320\x2d8fc8\x2d683957d99836-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dmrr5p.mount: Deactivated successfully. Sep 13 00:06:50.288673 kubelet[2910]: I0913 00:06:50.288584 2910 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/86eab1aa-9333-4320-8fc8-683957d99836-kube-api-access-mrr5p" (OuterVolumeSpecName: "kube-api-access-mrr5p") pod "86eab1aa-9333-4320-8fc8-683957d99836" (UID: "86eab1aa-9333-4320-8fc8-683957d99836"). InnerVolumeSpecName "kube-api-access-mrr5p". PluginName "kubernetes.io/projected", VolumeGIDValue "" Sep 13 00:06:50.353315 kubelet[2910]: I0913 00:06:50.353257 2910 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-mrr5p\" (UniqueName: \"kubernetes.io/projected/86eab1aa-9333-4320-8fc8-683957d99836-kube-api-access-mrr5p\") on node \"ip-172-31-27-21\" DevicePath \"\"" Sep 13 00:06:50.353625 kubelet[2910]: I0913 00:06:50.353597 2910 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/86eab1aa-9333-4320-8fc8-683957d99836-calico-apiserver-certs\") on node \"ip-172-31-27-21\" DevicePath \"\"" Sep 13 00:06:50.433642 systemd[1]: Removed slice kubepods-besteffort-pod86eab1aa_9333_4320_8fc8_683957d99836.slice. Sep 13 00:06:50.433902 systemd[1]: kubepods-besteffort-pod86eab1aa_9333_4320_8fc8_683957d99836.slice: Consumed 2.009s CPU time. Sep 13 00:06:50.863697 sshd[6344]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:50.865000 audit[6344]: USER_END pid=6344 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:50.865000 audit[6344]: CRED_DISP pid=6344 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:50.868252 systemd[1]: session-20.scope: Deactivated successfully. Sep 13 00:06:50.869972 systemd-logind[1793]: Session 20 logged out. Waiting for processes to exit. Sep 13 00:06:50.870682 systemd[1]: sshd@19-172.31.27.21:22-139.178.89.65:36704.service: Deactivated successfully. Sep 13 00:06:50.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.27.21:22-139.178.89.65:36704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:50.873996 systemd-logind[1793]: Removed session 20. Sep 13 00:06:50.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.21:22-139.178.89.65:54676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:50.907807 systemd[1]: Started sshd@20-172.31.27.21:22-139.178.89.65:54676.service. Sep 13 00:06:51.070000 audit[6371]: USER_ACCT pid=6371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:51.071594 sshd[6371]: Accepted publickey for core from 139.178.89.65 port 54676 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:51.073000 audit[6371]: CRED_ACQ pid=6371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:51.073000 audit[6371]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd963ade0 a2=3 a3=1 items=0 ppid=1 pid=6371 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:51.073000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:51.075220 sshd[6371]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:51.086222 systemd[1]: Started session-21.scope. Sep 13 00:06:51.088825 systemd-logind[1793]: New session 21 of user core. Sep 13 00:06:51.099000 audit[6371]: USER_START pid=6371 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:51.102000 audit[6373]: CRED_ACQ pid=6373 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:51.215000 audit[6382]: NETFILTER_CFG table=filter:145 family=2 entries=32 op=nft_register_rule pid=6382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:51.215000 audit[6382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd2eaa450 a2=0 a3=1 items=0 ppid=3059 pid=6382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:51.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:51.224000 audit[6382]: NETFILTER_CFG table=nat:146 family=2 entries=40 op=nft_register_rule pid=6382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:51.224000 audit[6382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12772 a0=3 a1=ffffd2eaa450 a2=0 a3=1 items=0 ppid=3059 pid=6382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:51.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:51.357238 sshd[6371]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:51.359000 audit[6371]: USER_END pid=6371 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:51.359000 audit[6371]: CRED_DISP pid=6371 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:51.363218 systemd[1]: sshd@20-172.31.27.21:22-139.178.89.65:54676.service: Deactivated successfully. Sep 13 00:06:51.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.27.21:22-139.178.89.65:54676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:51.364930 systemd[1]: session-21.scope: Deactivated successfully. Sep 13 00:06:51.367017 systemd-logind[1793]: Session 21 logged out. Waiting for processes to exit. Sep 13 00:06:51.369461 systemd-logind[1793]: Removed session 21. Sep 13 00:06:52.406891 kubelet[2910]: I0913 00:06:52.406812 2910 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="86eab1aa-9333-4320-8fc8-683957d99836" path="/var/lib/kubelet/pods/86eab1aa-9333-4320-8fc8-683957d99836/volumes" Sep 13 00:06:56.385690 systemd[1]: Started sshd@21-172.31.27.21:22-139.178.89.65:54692.service. Sep 13 00:06:56.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.21:22-139.178.89.65:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:56.388534 kernel: kauditd_printk_skb: 85 callbacks suppressed Sep 13 00:06:56.388690 kernel: audit: type=1130 audit(1757722016.385:1686): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.21:22-139.178.89.65:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:56.564000 audit[6387]: USER_ACCT pid=6387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.567111 sshd[6387]: Accepted publickey for core from 139.178.89.65 port 54692 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:06:56.570606 sshd[6387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:06:56.564000 audit[6387]: CRED_ACQ pid=6387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.585568 kernel: audit: type=1101 audit(1757722016.564:1687): pid=6387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.585721 kernel: audit: type=1103 audit(1757722016.564:1688): pid=6387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.585767 kernel: audit: type=1006 audit(1757722016.564:1689): pid=6387 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Sep 13 00:06:56.564000 audit[6387]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9afa950 a2=3 a3=1 items=0 ppid=1 pid=6387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:56.596755 systemd[1]: Started session-22.scope. Sep 13 00:06:56.599614 systemd-logind[1793]: New session 22 of user core. Sep 13 00:06:56.601661 kernel: audit: type=1300 audit(1757722016.564:1689): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9afa950 a2=3 a3=1 items=0 ppid=1 pid=6387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:56.564000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:56.605690 kernel: audit: type=1327 audit(1757722016.564:1689): proctitle=737368643A20636F7265205B707269765D Sep 13 00:06:56.611000 audit[6387]: USER_START pid=6387 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.611000 audit[6389]: CRED_ACQ pid=6389 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.631936 kernel: audit: type=1105 audit(1757722016.611:1690): pid=6387 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.632037 kernel: audit: type=1103 audit(1757722016.611:1691): pid=6389 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.861739 sshd[6387]: pam_unix(sshd:session): session closed for user core Sep 13 00:06:56.863000 audit[6387]: USER_END pid=6387 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.866363 systemd[1]: session-22.scope: Deactivated successfully. Sep 13 00:06:56.867636 systemd[1]: sshd@21-172.31.27.21:22-139.178.89.65:54692.service: Deactivated successfully. Sep 13 00:06:56.877214 systemd-logind[1793]: Session 22 logged out. Waiting for processes to exit. Sep 13 00:06:56.863000 audit[6387]: CRED_DISP pid=6387 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.887089 kernel: audit: type=1106 audit(1757722016.863:1692): pid=6387 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.887226 kernel: audit: type=1104 audit(1757722016.863:1693): pid=6387 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:06:56.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.27.21:22-139.178.89.65:54692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:06:56.888100 systemd-logind[1793]: Removed session 22. Sep 13 00:06:57.135192 systemd[1]: run-containerd-runc-k8s.io-0c6a8092f464d33788044f39de246d40aa18d3f10dc3c7ba13aa89070aa040d9-runc.TRjSdA.mount: Deactivated successfully. Sep 13 00:06:57.532000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:57.532000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40153944c0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:06:57.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:06:57.543000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:57.543000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4015412090 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:06:57.543000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:06:57.547000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=6791 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:57.547000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4015412120 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:06:57.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:06:57.567000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=6799 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:57.567000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40154121e0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:06:57.567000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:06:57.610000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:57.610000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4015412210 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:06:57.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:06:57.610000 audit[2582]: AVC avc: denied { watch } for pid=2582 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:57.610000 audit[2582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=401527b8a0 a2=fc6 a3=0 items=0 ppid=2439 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c110,c608 key=(null) Sep 13 00:06:57.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E3231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Sep 13 00:06:59.086000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:59.086000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:06:59.086000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40036ac780 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:06:59.086000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:06:59.086000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4003734be0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:06:59.086000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:06:59.569000 audit[6418]: NETFILTER_CFG table=filter:147 family=2 entries=20 op=nft_register_rule pid=6418 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:59.569000 audit[6418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe0a979a0 a2=0 a3=1 items=0 ppid=3059 pid=6418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:59.569000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:06:59.578000 audit[6418]: NETFILTER_CFG table=nat:148 family=2 entries=110 op=nft_register_chain pid=6418 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:06:59.578000 audit[6418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffe0a979a0 a2=0 a3=1 items=0 ppid=3059 pid=6418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:06:59.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:07:01.808366 systemd[1]: run-containerd-runc-k8s.io-0c8c72498f450532041009ee4e2c4bccc4b9b22ecdb541323e57165ec85cce4e-runc.LPeVqb.mount: Deactivated successfully. Sep 13 00:07:01.913591 kernel: kauditd_printk_skb: 31 callbacks suppressed Sep 13 00:07:01.913692 kernel: audit: type=1130 audit(1757722021.900:1705): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.21:22-139.178.89.65:55822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:01.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.21:22-139.178.89.65:55822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:01.901942 systemd[1]: Started sshd@22-172.31.27.21:22-139.178.89.65:55822.service. Sep 13 00:07:02.091000 audit[6442]: USER_ACCT pid=6442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.093365 sshd[6442]: Accepted publickey for core from 139.178.89.65 port 55822 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:07:02.099375 sshd[6442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:07:02.097000 audit[6442]: CRED_ACQ pid=6442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.113181 kernel: audit: type=1101 audit(1757722022.091:1706): pid=6442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.113421 kernel: audit: type=1103 audit(1757722022.097:1707): pid=6442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.120142 kernel: audit: type=1006 audit(1757722022.097:1708): pid=6442 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Sep 13 00:07:02.097000 audit[6442]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3f9c780 a2=3 a3=1 items=0 ppid=1 pid=6442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:02.131065 kernel: audit: type=1300 audit(1757722022.097:1708): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3f9c780 a2=3 a3=1 items=0 ppid=1 pid=6442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:02.097000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:02.135820 kernel: audit: type=1327 audit(1757722022.097:1708): proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:02.140606 systemd-logind[1793]: New session 23 of user core. Sep 13 00:07:02.143645 systemd[1]: Started session-23.scope. Sep 13 00:07:02.152000 audit[6442]: USER_START pid=6442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.166557 kernel: audit: type=1105 audit(1757722022.152:1709): pid=6442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.165000 audit[6445]: CRED_ACQ pid=6445 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.177572 kernel: audit: type=1103 audit(1757722022.165:1710): pid=6445 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.415969 sshd[6442]: pam_unix(sshd:session): session closed for user core Sep 13 00:07:02.416000 audit[6442]: USER_END pid=6442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.430453 systemd[1]: sshd@22-172.31.27.21:22-139.178.89.65:55822.service: Deactivated successfully. Sep 13 00:07:02.432021 systemd[1]: session-23.scope: Deactivated successfully. Sep 13 00:07:02.417000 audit[6442]: CRED_DISP pid=6442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.434095 systemd-logind[1793]: Session 23 logged out. Waiting for processes to exit. Sep 13 00:07:02.442552 kernel: audit: type=1106 audit(1757722022.416:1711): pid=6442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.442691 kernel: audit: type=1104 audit(1757722022.417:1712): pid=6442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:02.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.27.21:22-139.178.89.65:55822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:02.444335 systemd-logind[1793]: Removed session 23. Sep 13 00:07:03.230886 kubelet[2910]: I0913 00:07:03.230826 2910 scope.go:117] "RemoveContainer" containerID="3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652" Sep 13 00:07:03.234059 env[1800]: time="2025-09-13T00:07:03.233974132Z" level=info msg="RemoveContainer for \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\"" Sep 13 00:07:03.243089 env[1800]: time="2025-09-13T00:07:03.243011074Z" level=info msg="RemoveContainer for \"3ffa17d9563084d2193ac3f3e1ea562e6f887b52bd298f5f8afd042f4a790652\" returns successfully" Sep 13 00:07:03.246976 env[1800]: time="2025-09-13T00:07:03.246900912Z" level=info msg="StopPodSandbox for \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\"" Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.348 [WARNING][6464] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0", GenerateName:"calico-apiserver-6764956d8d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b1e8d677-ddcc-4797-9a2b-15289c5f278d", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6764956d8d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32", Pod:"calico-apiserver-6764956d8d-gcsgl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali448c2bc8c41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.349 [INFO][6464] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.349 [INFO][6464] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" iface="eth0" netns="" Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.349 [INFO][6464] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.349 [INFO][6464] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.400 [INFO][6471] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.400 [INFO][6471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.401 [INFO][6471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.417 [WARNING][6471] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.417 [INFO][6471] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.421 [INFO][6471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:03.426870 env[1800]: 2025-09-13 00:07:03.424 [INFO][6464] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:07:03.429219 env[1800]: time="2025-09-13T00:07:03.429128221Z" level=info msg="TearDown network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\" successfully" Sep 13 00:07:03.429219 env[1800]: time="2025-09-13T00:07:03.429211043Z" level=info msg="StopPodSandbox for \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\" returns successfully" Sep 13 00:07:03.430443 env[1800]: time="2025-09-13T00:07:03.430384095Z" level=info msg="RemovePodSandbox for \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\"" Sep 13 00:07:03.430765 env[1800]: time="2025-09-13T00:07:03.430680043Z" level=info msg="Forcibly stopping sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\"" Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.520 [WARNING][6485] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0", GenerateName:"calico-apiserver-6764956d8d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b1e8d677-ddcc-4797-9a2b-15289c5f278d", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6764956d8d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"4d8b7d8297a5cc48cf674f40401a56543730add2bf52d7f3a753ebb46f7c6e32", Pod:"calico-apiserver-6764956d8d-gcsgl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.39.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali448c2bc8c41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.520 [INFO][6485] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.520 [INFO][6485] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" iface="eth0" netns="" Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.520 [INFO][6485] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.520 [INFO][6485] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.580 [INFO][6492] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.581 [INFO][6492] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.581 [INFO][6492] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.597 [WARNING][6492] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.597 [INFO][6492] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" HandleID="k8s-pod-network.e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Workload="ip--172--31--27--21-k8s-calico--apiserver--6764956d8d--gcsgl-eth0" Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.600 [INFO][6492] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:03.606622 env[1800]: 2025-09-13 00:07:03.603 [INFO][6485] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2" Sep 13 00:07:03.607655 env[1800]: time="2025-09-13T00:07:03.607600748Z" level=info msg="TearDown network for sandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\" successfully" Sep 13 00:07:03.616012 env[1800]: time="2025-09-13T00:07:03.615940557Z" level=info msg="RemovePodSandbox \"e0d91eb44da6a25f3d26e3cf1641b156ec785132f3878d6a5a5e291187e849f2\" returns successfully" Sep 13 00:07:03.617171 env[1800]: time="2025-09-13T00:07:03.617106949Z" level=info msg="StopPodSandbox for \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\"" Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.834 [WARNING][6508] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0", GenerateName:"calico-kube-controllers-68d596d8c-", Namespace:"calico-system", SelfLink:"", UID:"e649b2a4-e3e6-4707-952b-39cddc6671e5", ResourceVersion:"1325", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d596d8c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00", Pod:"calico-kube-controllers-68d596d8c-6g75b", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.39.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califd23ec105c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.835 [INFO][6508] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.836 [INFO][6508] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" iface="eth0" netns="" Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.836 [INFO][6508] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.836 [INFO][6508] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.893 [INFO][6515] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.894 [INFO][6515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.894 [INFO][6515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.917 [WARNING][6515] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.917 [INFO][6515] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.920 [INFO][6515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:03.926062 env[1800]: 2025-09-13 00:07:03.923 [INFO][6508] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:07:03.926062 env[1800]: time="2025-09-13T00:07:03.926021797Z" level=info msg="TearDown network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\" successfully" Sep 13 00:07:03.927052 env[1800]: time="2025-09-13T00:07:03.926071428Z" level=info msg="StopPodSandbox for \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\" returns successfully" Sep 13 00:07:03.928897 env[1800]: time="2025-09-13T00:07:03.928848872Z" level=info msg="RemovePodSandbox for \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\"" Sep 13 00:07:03.929155 env[1800]: time="2025-09-13T00:07:03.929095742Z" level=info msg="Forcibly stopping sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\"" Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.079 [WARNING][6529] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0", GenerateName:"calico-kube-controllers-68d596d8c-", Namespace:"calico-system", SelfLink:"", UID:"e649b2a4-e3e6-4707-952b-39cddc6671e5", ResourceVersion:"1325", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d596d8c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"27301ab22e908199ad6ed7a77424305054630846e3a0e3e89786b08c4dd4eb00", Pod:"calico-kube-controllers-68d596d8c-6g75b", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.39.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califd23ec105c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.080 [INFO][6529] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.080 [INFO][6529] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" iface="eth0" netns="" Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.080 [INFO][6529] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.080 [INFO][6529] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.155 [INFO][6536] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.156 [INFO][6536] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.156 [INFO][6536] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.189 [WARNING][6536] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.190 [INFO][6536] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" HandleID="k8s-pod-network.38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Workload="ip--172--31--27--21-k8s-calico--kube--controllers--68d596d8c--6g75b-eth0" Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.193 [INFO][6536] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:04.199396 env[1800]: 2025-09-13 00:07:04.196 [INFO][6529] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086" Sep 13 00:07:04.200452 env[1800]: time="2025-09-13T00:07:04.200392882Z" level=info msg="TearDown network for sandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\" successfully" Sep 13 00:07:04.207739 env[1800]: time="2025-09-13T00:07:04.207668442Z" level=info msg="RemovePodSandbox \"38273460bd8efaaa71ed0c9e2dfca40a172693cb728b7975c2d242768d2f3086\" returns successfully" Sep 13 00:07:04.208734 env[1800]: time="2025-09-13T00:07:04.208670019Z" level=info msg="StopPodSandbox for \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\"" Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.357 [WARNING][6550] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a1b1282-a990-45e1-9198-e7947e011e69", ResourceVersion:"1337", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926", Pod:"csi-node-driver-6tbpg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.39.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia65782482fe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.358 [INFO][6550] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.358 [INFO][6550] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" iface="eth0" netns="" Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.358 [INFO][6550] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.358 [INFO][6550] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.429 [INFO][6557] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.430 [INFO][6557] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.431 [INFO][6557] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.446 [WARNING][6557] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.446 [INFO][6557] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.449 [INFO][6557] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:04.456143 env[1800]: 2025-09-13 00:07:04.452 [INFO][6550] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:07:04.457615 env[1800]: time="2025-09-13T00:07:04.457550382Z" level=info msg="TearDown network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\" successfully" Sep 13 00:07:04.458370 env[1800]: time="2025-09-13T00:07:04.457779348Z" level=info msg="StopPodSandbox for \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\" returns successfully" Sep 13 00:07:04.459405 env[1800]: time="2025-09-13T00:07:04.459308167Z" level=info msg="RemovePodSandbox for \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\"" Sep 13 00:07:04.459629 env[1800]: time="2025-09-13T00:07:04.459395069Z" level=info msg="Forcibly stopping sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\"" Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.549 [WARNING][6571] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0a1b1282-a990-45e1-9198-e7947e011e69", ResourceVersion:"1337", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"826ad626085daa7b4e7597d569c8f680ff7b8e75a5445ec38d38138c01da8926", Pod:"csi-node-driver-6tbpg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.39.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calia65782482fe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.550 [INFO][6571] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.550 [INFO][6571] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" iface="eth0" netns="" Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.550 [INFO][6571] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.550 [INFO][6571] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.602 [INFO][6578] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.603 [INFO][6578] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.603 [INFO][6578] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.627 [WARNING][6578] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.627 [INFO][6578] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" HandleID="k8s-pod-network.e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Workload="ip--172--31--27--21-k8s-csi--node--driver--6tbpg-eth0" Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.632 [INFO][6578] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:04.638560 env[1800]: 2025-09-13 00:07:04.634 [INFO][6571] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba" Sep 13 00:07:04.638560 env[1800]: time="2025-09-13T00:07:04.638351845Z" level=info msg="TearDown network for sandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\" successfully" Sep 13 00:07:04.646130 env[1800]: time="2025-09-13T00:07:04.645984252Z" level=info msg="RemovePodSandbox \"e593b23e76d22e4b5c4b32a32aeb7db5f1824d2a666f8715a1ab0889ac83a8ba\" returns successfully" Sep 13 00:07:04.647091 env[1800]: time="2025-09-13T00:07:04.647042096Z" level=info msg="StopPodSandbox for \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\"" Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.722 [WARNING][6592] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"5ac35ace-3aab-4949-a692-f16bda148488", ResourceVersion:"1464", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b", Pod:"goldmane-54d579b49d-rdxkn", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.39.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicfe0cd5facc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.722 [INFO][6592] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.722 [INFO][6592] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" iface="eth0" netns="" Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.723 [INFO][6592] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.723 [INFO][6592] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.765 [INFO][6599] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.766 [INFO][6599] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.766 [INFO][6599] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.783 [WARNING][6599] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.783 [INFO][6599] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.786 [INFO][6599] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:04.793961 env[1800]: 2025-09-13 00:07:04.790 [INFO][6592] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:07:04.795086 env[1800]: time="2025-09-13T00:07:04.794762750Z" level=info msg="TearDown network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\" successfully" Sep 13 00:07:04.795086 env[1800]: time="2025-09-13T00:07:04.794819257Z" level=info msg="StopPodSandbox for \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\" returns successfully" Sep 13 00:07:04.795946 env[1800]: time="2025-09-13T00:07:04.795855441Z" level=info msg="RemovePodSandbox for \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\"" Sep 13 00:07:04.796107 env[1800]: time="2025-09-13T00:07:04.795934783Z" level=info msg="Forcibly stopping sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\"" Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.883 [WARNING][6614] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0", GenerateName:"goldmane-54d579b49d-", Namespace:"calico-system", SelfLink:"", UID:"5ac35ace-3aab-4949-a692-f16bda148488", ResourceVersion:"1464", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"54d579b49d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"8aadbc8ab0270e79478e808ba21e991574aed1bce14a4632d4a91d72b8d8ff9b", Pod:"goldmane-54d579b49d-rdxkn", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.39.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calicfe0cd5facc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.883 [INFO][6614] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.884 [INFO][6614] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" iface="eth0" netns="" Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.884 [INFO][6614] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.884 [INFO][6614] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.931 [INFO][6621] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.931 [INFO][6621] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.931 [INFO][6621] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.945 [WARNING][6621] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.946 [INFO][6621] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" HandleID="k8s-pod-network.efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Workload="ip--172--31--27--21-k8s-goldmane--54d579b49d--rdxkn-eth0" Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.948 [INFO][6621] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:04.954443 env[1800]: 2025-09-13 00:07:04.951 [INFO][6614] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f" Sep 13 00:07:04.955563 env[1800]: time="2025-09-13T00:07:04.954492874Z" level=info msg="TearDown network for sandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\" successfully" Sep 13 00:07:04.962823 env[1800]: time="2025-09-13T00:07:04.962666323Z" level=info msg="RemovePodSandbox \"efb9188ad48614caaa5251f6e0e0232709264d22bbc60e370989b49fb011e68f\" returns successfully" Sep 13 00:07:04.963746 env[1800]: time="2025-09-13T00:07:04.963657052Z" level=info msg="StopPodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\"" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.093 [WARNING][6635] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.093 [INFO][6635] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.093 [INFO][6635] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" iface="eth0" netns="" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.094 [INFO][6635] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.094 [INFO][6635] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.167 [INFO][6642] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.168 [INFO][6642] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.168 [INFO][6642] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.209 [WARNING][6642] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.209 [INFO][6642] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.217 [INFO][6642] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:05.223573 env[1800]: 2025-09-13 00:07:05.220 [INFO][6635] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:07:05.224449 env[1800]: time="2025-09-13T00:07:05.223622913Z" level=info msg="TearDown network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" successfully" Sep 13 00:07:05.224449 env[1800]: time="2025-09-13T00:07:05.223673287Z" level=info msg="StopPodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" returns successfully" Sep 13 00:07:05.225567 env[1800]: time="2025-09-13T00:07:05.225477836Z" level=info msg="RemovePodSandbox for \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\"" Sep 13 00:07:05.225913 env[1800]: time="2025-09-13T00:07:05.225810455Z" level=info msg="Forcibly stopping sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\"" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.332 [WARNING][6656] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.332 [INFO][6656] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.332 [INFO][6656] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" iface="eth0" netns="" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.333 [INFO][6656] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.333 [INFO][6656] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.382 [INFO][6663] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.382 [INFO][6663] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.382 [INFO][6663] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.397 [WARNING][6663] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.398 [INFO][6663] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" HandleID="k8s-pod-network.5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.402 [INFO][6663] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:05.408147 env[1800]: 2025-09-13 00:07:05.405 [INFO][6656] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281" Sep 13 00:07:05.409371 env[1800]: time="2025-09-13T00:07:05.409311571Z" level=info msg="TearDown network for sandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" successfully" Sep 13 00:07:05.417385 env[1800]: time="2025-09-13T00:07:05.417292571Z" level=info msg="RemovePodSandbox \"5f1ad66b2192199493d1496d9dfdc82d2922fbdd6401b7701146e9291130a281\" returns successfully" Sep 13 00:07:05.418525 env[1800]: time="2025-09-13T00:07:05.418435937Z" level=info msg="StopPodSandbox for \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\"" Sep 13 00:07:05.589000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:07:05.589000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4003735ec0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:07:05.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:07:05.589000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:07:05.589000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4003735ee0 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:07:05.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:07:05.591000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:07:05.591000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4003735f00 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:07:05.591000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:07:05.599000 audit[2594]: AVC avc: denied { watch } for pid=2594 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:07:05.599000 audit[2594]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4003893060 a2=fc6 a3=0 items=0 ppid=2411 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:07:05.599000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.551 [WARNING][6679] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.551 [INFO][6679] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.551 [INFO][6679] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" iface="eth0" netns="" Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.551 [INFO][6679] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.551 [INFO][6679] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.627 [INFO][6686] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.632 [INFO][6686] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.633 [INFO][6686] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.656 [WARNING][6686] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.656 [INFO][6686] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.672 [INFO][6686] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:05.678412 env[1800]: 2025-09-13 00:07:05.675 [INFO][6679] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:07:05.679790 env[1800]: time="2025-09-13T00:07:05.678458208Z" level=info msg="TearDown network for sandbox \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\" successfully" Sep 13 00:07:05.679790 env[1800]: time="2025-09-13T00:07:05.678598269Z" level=info msg="StopPodSandbox for \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\" returns successfully" Sep 13 00:07:05.679790 env[1800]: time="2025-09-13T00:07:05.679259319Z" level=info msg="RemovePodSandbox for \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\"" Sep 13 00:07:05.679790 env[1800]: time="2025-09-13T00:07:05.679320878Z" level=info msg="Forcibly stopping sandbox \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\"" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.789 [WARNING][6701] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.789 [INFO][6701] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.789 [INFO][6701] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" iface="eth0" netns="" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.789 [INFO][6701] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.789 [INFO][6701] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.853 [INFO][6708] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.853 [INFO][6708] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.853 [INFO][6708] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.871 [WARNING][6708] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.871 [INFO][6708] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" HandleID="k8s-pod-network.23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--snkh7-eth0" Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.876 [INFO][6708] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:05.882576 env[1800]: 2025-09-13 00:07:05.879 [INFO][6701] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c" Sep 13 00:07:05.883572 env[1800]: time="2025-09-13T00:07:05.883476506Z" level=info msg="TearDown network for sandbox \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\" successfully" Sep 13 00:07:05.892148 env[1800]: time="2025-09-13T00:07:05.892049823Z" level=info msg="RemovePodSandbox \"23b42a4ec9c733d999a9690704e055fedb87f86fe69fae05fb895e1d9a30f04c\" returns successfully" Sep 13 00:07:05.893418 env[1800]: time="2025-09-13T00:07:05.893308649Z" level=info msg="StopPodSandbox for \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\"" Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.008 [WARNING][6722] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"826cb41c-6196-44e2-8067-26a5b78bea02", ResourceVersion:"1140", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb", Pod:"coredns-674b8bbfcf-xhbkk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.39.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali36b210a4cde", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.008 [INFO][6722] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.008 [INFO][6722] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" iface="eth0" netns="" Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.008 [INFO][6722] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.008 [INFO][6722] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.074 [INFO][6729] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.078 [INFO][6729] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.078 [INFO][6729] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.095 [WARNING][6729] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.095 [INFO][6729] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.099 [INFO][6729] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:06.105162 env[1800]: 2025-09-13 00:07:06.102 [INFO][6722] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:07:06.105162 env[1800]: time="2025-09-13T00:07:06.105125677Z" level=info msg="TearDown network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\" successfully" Sep 13 00:07:06.106348 env[1800]: time="2025-09-13T00:07:06.105174179Z" level=info msg="StopPodSandbox for \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\" returns successfully" Sep 13 00:07:06.106864 env[1800]: time="2025-09-13T00:07:06.106760622Z" level=info msg="RemovePodSandbox for \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\"" Sep 13 00:07:06.107246 env[1800]: time="2025-09-13T00:07:06.107127536Z" level=info msg="Forcibly stopping sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\"" Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.216 [WARNING][6744] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"826cb41c-6196-44e2-8067-26a5b78bea02", ResourceVersion:"1140", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"8962f0fe3df6217940e6ecdbb8ee4076a8cc3978796d254bf9e1178365afdfdb", Pod:"coredns-674b8bbfcf-xhbkk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.39.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali36b210a4cde", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.217 [INFO][6744] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.217 [INFO][6744] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" iface="eth0" netns="" Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.217 [INFO][6744] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.217 [INFO][6744] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.292 [INFO][6751] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.293 [INFO][6751] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.293 [INFO][6751] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.309 [WARNING][6751] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.309 [INFO][6751] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" HandleID="k8s-pod-network.955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--xhbkk-eth0" Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.312 [INFO][6751] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:06.319562 env[1800]: 2025-09-13 00:07:06.315 [INFO][6744] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9" Sep 13 00:07:06.319562 env[1800]: time="2025-09-13T00:07:06.317854439Z" level=info msg="TearDown network for sandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\" successfully" Sep 13 00:07:06.325965 env[1800]: time="2025-09-13T00:07:06.325886489Z" level=info msg="RemovePodSandbox \"955fe26c574ed1cc8b91225a297475d7510226846b2a76a6a78e9539e6d15aa9\" returns successfully" Sep 13 00:07:06.326833 env[1800]: time="2025-09-13T00:07:06.326749399Z" level=info msg="StopPodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\"" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.419 [WARNING][6767] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.419 [INFO][6767] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.420 [INFO][6767] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" iface="eth0" netns="" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.420 [INFO][6767] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.420 [INFO][6767] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.482 [INFO][6774] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.482 [INFO][6774] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.483 [INFO][6774] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.509 [WARNING][6774] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.509 [INFO][6774] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.515 [INFO][6774] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:06.521848 env[1800]: 2025-09-13 00:07:06.517 [INFO][6767] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:07:06.522822 env[1800]: time="2025-09-13T00:07:06.521896918Z" level=info msg="TearDown network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" successfully" Sep 13 00:07:06.522822 env[1800]: time="2025-09-13T00:07:06.521954672Z" level=info msg="StopPodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" returns successfully" Sep 13 00:07:06.524926 env[1800]: time="2025-09-13T00:07:06.524848348Z" level=info msg="RemovePodSandbox for \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\"" Sep 13 00:07:06.525270 env[1800]: time="2025-09-13T00:07:06.525157316Z" level=info msg="Forcibly stopping sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\"" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.620 [WARNING][6791] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.621 [INFO][6791] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.621 [INFO][6791] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" iface="eth0" netns="" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.621 [INFO][6791] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.621 [INFO][6791] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.663 [INFO][6798] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.663 [INFO][6798] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.663 [INFO][6798] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.679 [WARNING][6798] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.679 [INFO][6798] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" HandleID="k8s-pod-network.4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.683 [INFO][6798] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:06.688953 env[1800]: 2025-09-13 00:07:06.686 [INFO][6791] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681" Sep 13 00:07:06.690564 env[1800]: time="2025-09-13T00:07:06.688901825Z" level=info msg="TearDown network for sandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" successfully" Sep 13 00:07:06.697425 env[1800]: time="2025-09-13T00:07:06.697347672Z" level=info msg="RemovePodSandbox \"4d87627c0e379b10e134168a4e054ec270da59d7a7c97b40cac7a367b6e82681\" returns successfully" Sep 13 00:07:06.698445 env[1800]: time="2025-09-13T00:07:06.698362726Z" level=info msg="StopPodSandbox for \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\"" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.787 [WARNING][6812] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.787 [INFO][6812] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.787 [INFO][6812] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" iface="eth0" netns="" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.787 [INFO][6812] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.787 [INFO][6812] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.842 [INFO][6819] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.842 [INFO][6819] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.842 [INFO][6819] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.859 [WARNING][6819] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.860 [INFO][6819] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.863 [INFO][6819] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:06.869422 env[1800]: 2025-09-13 00:07:06.866 [INFO][6812] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:07:06.870472 env[1800]: time="2025-09-13T00:07:06.870410021Z" level=info msg="TearDown network for sandbox \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\" successfully" Sep 13 00:07:06.870686 env[1800]: time="2025-09-13T00:07:06.870644855Z" level=info msg="StopPodSandbox for \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\" returns successfully" Sep 13 00:07:06.871681 env[1800]: time="2025-09-13T00:07:06.871598590Z" level=info msg="RemovePodSandbox for \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\"" Sep 13 00:07:06.871841 env[1800]: time="2025-09-13T00:07:06.871669592Z" level=info msg="Forcibly stopping sandbox \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\"" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:06.955 [WARNING][6834] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" WorkloadEndpoint="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:06.956 [INFO][6834] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:06.956 [INFO][6834] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" iface="eth0" netns="" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:06.956 [INFO][6834] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:06.956 [INFO][6834] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:07.016 [INFO][6841] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:07.017 [INFO][6841] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:07.017 [INFO][6841] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:07.039 [WARNING][6841] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:07.040 [INFO][6841] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" HandleID="k8s-pod-network.0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Workload="ip--172--31--27--21-k8s-calico--apiserver--f8688475b--gfns6-eth0" Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:07.043 [INFO][6841] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:07.048621 env[1800]: 2025-09-13 00:07:07.045 [INFO][6834] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda" Sep 13 00:07:07.049373 env[1800]: time="2025-09-13T00:07:07.048649938Z" level=info msg="TearDown network for sandbox \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\" successfully" Sep 13 00:07:07.057025 env[1800]: time="2025-09-13T00:07:07.056932004Z" level=info msg="RemovePodSandbox \"0ab9d6a95a065cc346ff082bf2191487990918140b19c1b97c9bc32ce1bd5fda\" returns successfully" Sep 13 00:07:07.057889 env[1800]: time="2025-09-13T00:07:07.057821241Z" level=info msg="StopPodSandbox for \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\"" Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.146 [WARNING][6855] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"cb741d37-7d49-431e-9106-0f883bed0386", ResourceVersion:"1135", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997", Pod:"coredns-674b8bbfcf-kfggq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.39.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia87bab4ca93", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.146 [INFO][6855] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.147 [INFO][6855] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" iface="eth0" netns="" Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.147 [INFO][6855] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.147 [INFO][6855] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.221 [INFO][6862] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.221 [INFO][6862] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.221 [INFO][6862] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.236 [WARNING][6862] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.237 [INFO][6862] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.240 [INFO][6862] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:07.247392 env[1800]: 2025-09-13 00:07:07.243 [INFO][6855] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:07:07.248293 env[1800]: time="2025-09-13T00:07:07.247421725Z" level=info msg="TearDown network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\" successfully" Sep 13 00:07:07.248293 env[1800]: time="2025-09-13T00:07:07.247467612Z" level=info msg="StopPodSandbox for \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\" returns successfully" Sep 13 00:07:07.248293 env[1800]: time="2025-09-13T00:07:07.248103559Z" level=info msg="RemovePodSandbox for \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\"" Sep 13 00:07:07.248293 env[1800]: time="2025-09-13T00:07:07.248153034Z" level=info msg="Forcibly stopping sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\"" Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.355 [WARNING][6876] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"cb741d37-7d49-431e-9106-0f883bed0386", ResourceVersion:"1135", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 5, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-21", ContainerID:"9440bce789e977ec7986396e45233109975fda2b625c5a64ac740e20f1929997", Pod:"coredns-674b8bbfcf-kfggq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.39.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia87bab4ca93", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.356 [INFO][6876] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.356 [INFO][6876] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" iface="eth0" netns="" Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.356 [INFO][6876] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.356 [INFO][6876] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.418 [INFO][6883] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.419 [INFO][6883] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.419 [INFO][6883] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.432 [WARNING][6883] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.432 [INFO][6883] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" HandleID="k8s-pod-network.30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Workload="ip--172--31--27--21-k8s-coredns--674b8bbfcf--kfggq-eth0" Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.434 [INFO][6883] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:07:07.444590 env[1800]: 2025-09-13 00:07:07.439 [INFO][6876] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b" Sep 13 00:07:07.444590 env[1800]: time="2025-09-13T00:07:07.442156457Z" level=info msg="TearDown network for sandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\" successfully" Sep 13 00:07:07.463390 kernel: kauditd_printk_skb: 13 callbacks suppressed Sep 13 00:07:07.463547 kernel: audit: type=1130 audit(1757722027.450:1718): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.21:22-139.178.89.65:55828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:07.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.21:22-139.178.89.65:55828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:07.450193 systemd[1]: Started sshd@23-172.31.27.21:22-139.178.89.65:55828.service. Sep 13 00:07:07.465270 env[1800]: time="2025-09-13T00:07:07.464782735Z" level=info msg="RemovePodSandbox \"30169cc236344bacc741b0c5d42958647e478768332ee7c77297a36e3712770b\" returns successfully" Sep 13 00:07:07.646000 audit[6890]: USER_ACCT pid=6890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:07.650769 sshd[6890]: Accepted publickey for core from 139.178.89.65 port 55828 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:07:07.660747 kernel: audit: type=1101 audit(1757722027.646:1719): pid=6890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:07.661774 sshd[6890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:07:07.658000 audit[6890]: CRED_ACQ pid=6890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:07.679447 kernel: audit: type=1103 audit(1757722027.658:1720): pid=6890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:07.679752 kernel: audit: type=1006 audit(1757722027.658:1721): pid=6890 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Sep 13 00:07:07.658000 audit[6890]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffedc8990 a2=3 a3=1 items=0 ppid=1 pid=6890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:07.690253 kernel: audit: type=1300 audit(1757722027.658:1721): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffedc8990 a2=3 a3=1 items=0 ppid=1 pid=6890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:07.658000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:07.697474 kernel: audit: type=1327 audit(1757722027.658:1721): proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:07.699285 systemd-logind[1793]: New session 24 of user core. Sep 13 00:07:07.700938 systemd[1]: Started session-24.scope. Sep 13 00:07:07.720000 audit[6890]: USER_START pid=6890 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:07.734000 audit[6892]: CRED_ACQ pid=6892 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:07.747458 kernel: audit: type=1105 audit(1757722027.720:1722): pid=6890 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:07.747604 kernel: audit: type=1103 audit(1757722027.734:1723): pid=6892 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:08.044757 sshd[6890]: pam_unix(sshd:session): session closed for user core Sep 13 00:07:08.045000 audit[6890]: USER_END pid=6890 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:08.049966 systemd-logind[1793]: Session 24 logged out. Waiting for processes to exit. Sep 13 00:07:08.045000 audit[6890]: CRED_DISP pid=6890 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:08.061089 systemd[1]: sshd@23-172.31.27.21:22-139.178.89.65:55828.service: Deactivated successfully. Sep 13 00:07:08.062975 systemd[1]: session-24.scope: Deactivated successfully. Sep 13 00:07:08.066621 systemd-logind[1793]: Removed session 24. Sep 13 00:07:08.071798 kernel: audit: type=1106 audit(1757722028.045:1724): pid=6890 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:08.072000 kernel: audit: type=1104 audit(1757722028.045:1725): pid=6890 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:08.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.27.21:22-139.178.89.65:55828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:13.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.21:22-139.178.89.65:59238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:13.080735 systemd[1]: Started sshd@24-172.31.27.21:22-139.178.89.65:59238.service. Sep 13 00:07:13.083487 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:07:13.083671 kernel: audit: type=1130 audit(1757722033.079:1727): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.21:22-139.178.89.65:59238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:13.253823 systemd[1]: run-containerd-runc-k8s.io-9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b-runc.Ma42s8.mount: Deactivated successfully. Sep 13 00:07:13.288000 audit[6906]: USER_ACCT pid=6906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.292107 sshd[6906]: Accepted publickey for core from 139.178.89.65 port 59238 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:07:13.293807 sshd[6906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:07:13.288000 audit[6906]: CRED_ACQ pid=6906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.316132 kernel: audit: type=1101 audit(1757722033.288:1728): pid=6906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.316281 kernel: audit: type=1103 audit(1757722033.288:1729): pid=6906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.318681 systemd-logind[1793]: New session 25 of user core. Sep 13 00:07:13.320005 systemd[1]: Started session-25.scope. Sep 13 00:07:13.334918 kernel: audit: type=1006 audit(1757722033.288:1730): pid=6906 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Sep 13 00:07:13.288000 audit[6906]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc81efcc0 a2=3 a3=1 items=0 ppid=1 pid=6906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:13.350540 kernel: audit: type=1300 audit(1757722033.288:1730): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc81efcc0 a2=3 a3=1 items=0 ppid=1 pid=6906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:13.288000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:13.361915 kernel: audit: type=1327 audit(1757722033.288:1730): proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:13.326000 audit[6906]: USER_START pid=6906 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.372965 kernel: audit: type=1105 audit(1757722033.326:1731): pid=6906 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.332000 audit[6923]: CRED_ACQ pid=6923 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.386424 kernel: audit: type=1103 audit(1757722033.332:1732): pid=6923 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.629607 sshd[6906]: pam_unix(sshd:session): session closed for user core Sep 13 00:07:13.630000 audit[6906]: USER_END pid=6906 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.635227 systemd[1]: session-25.scope: Deactivated successfully. Sep 13 00:07:13.636592 systemd[1]: sshd@24-172.31.27.21:22-139.178.89.65:59238.service: Deactivated successfully. Sep 13 00:07:13.645095 systemd-logind[1793]: Session 25 logged out. Waiting for processes to exit. Sep 13 00:07:13.631000 audit[6906]: CRED_DISP pid=6906 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.654810 kernel: audit: type=1106 audit(1757722033.630:1733): pid=6906 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.655027 kernel: audit: type=1104 audit(1757722033.631:1734): pid=6906 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:13.656576 systemd-logind[1793]: Removed session 25. Sep 13 00:07:13.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.27.21:22-139.178.89.65:59238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:18.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.21:22-139.178.89.65:59260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:18.668593 systemd[1]: Started sshd@25-172.31.27.21:22-139.178.89.65:59260.service. Sep 13 00:07:18.671621 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:07:18.671740 kernel: audit: type=1130 audit(1757722038.668:1736): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.21:22-139.178.89.65:59260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:18.845000 audit[6938]: USER_ACCT pid=6938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:18.846100 sshd[6938]: Accepted publickey for core from 139.178.89.65 port 59260 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:07:18.849327 sshd[6938]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:07:18.847000 audit[6938]: CRED_ACQ pid=6938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:18.869725 kernel: audit: type=1101 audit(1757722038.845:1737): pid=6938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:18.869888 kernel: audit: type=1103 audit(1757722038.847:1738): pid=6938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:18.879019 kernel: audit: type=1006 audit(1757722038.848:1739): pid=6938 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Sep 13 00:07:18.881892 systemd-logind[1793]: New session 26 of user core. Sep 13 00:07:18.883899 systemd[1]: Started session-26.scope. Sep 13 00:07:18.848000 audit[6938]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc25c3570 a2=3 a3=1 items=0 ppid=1 pid=6938 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:18.895322 kernel: audit: type=1300 audit(1757722038.848:1739): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc25c3570 a2=3 a3=1 items=0 ppid=1 pid=6938 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:18.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:18.904550 kernel: audit: type=1327 audit(1757722038.848:1739): proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:18.913000 audit[6938]: USER_START pid=6938 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:18.913000 audit[6940]: CRED_ACQ pid=6940 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:18.943572 kernel: audit: type=1105 audit(1757722038.913:1740): pid=6938 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:18.943728 kernel: audit: type=1103 audit(1757722038.913:1741): pid=6940 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:19.071001 systemd[1]: run-containerd-runc-k8s.io-9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b-runc.FOxYOw.mount: Deactivated successfully. Sep 13 00:07:19.273630 sshd[6938]: pam_unix(sshd:session): session closed for user core Sep 13 00:07:19.276000 audit[6938]: USER_END pid=6938 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:19.280697 systemd-logind[1793]: Session 26 logged out. Waiting for processes to exit. Sep 13 00:07:19.292586 systemd[1]: sshd@25-172.31.27.21:22-139.178.89.65:59260.service: Deactivated successfully. Sep 13 00:07:19.294114 systemd[1]: session-26.scope: Deactivated successfully. Sep 13 00:07:19.277000 audit[6938]: CRED_DISP pid=6938 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:19.294616 kernel: audit: type=1106 audit(1757722039.276:1742): pid=6938 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:19.296830 systemd-logind[1793]: Removed session 26. Sep 13 00:07:19.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.27.21:22-139.178.89.65:59260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:19.311560 kernel: audit: type=1104 audit(1757722039.277:1743): pid=6938 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:23.657000 audit[5699]: AVC avc: denied { watch } for pid=5699 comm="apiserver" path="/calico-apiserver-certs/..2025_09_13_00_05_51.3223640934/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c458 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c458 tclass=file permissive=0 Sep 13 00:07:23.657000 audit[5699]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40013df560 a2=fc6 a3=0 items=0 ppid=4948 pid=5699 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c458 key=(null) Sep 13 00:07:23.657000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Sep 13 00:07:24.308750 systemd[1]: Started sshd@26-172.31.27.21:22-139.178.89.65:39720.service. Sep 13 00:07:24.317022 kernel: kauditd_printk_skb: 4 callbacks suppressed Sep 13 00:07:24.317125 kernel: audit: type=1130 audit(1757722044.308:1746): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.21:22-139.178.89.65:39720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:24.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.21:22-139.178.89.65:39720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:24.501909 sshd[6970]: Accepted publickey for core from 139.178.89.65 port 39720 ssh2: RSA SHA256:hZ9iVout2PrR+GbvdOVRihMPHc0rDrYOM1fRKHgWdwM Sep 13 00:07:24.501000 audit[6970]: USER_ACCT pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.513410 sshd[6970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:07:24.512000 audit[6970]: CRED_ACQ pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.523599 kernel: audit: type=1101 audit(1757722044.501:1747): pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.523793 kernel: audit: type=1103 audit(1757722044.512:1748): pid=6970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.530092 kernel: audit: type=1006 audit(1757722044.512:1749): pid=6970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Sep 13 00:07:24.512000 audit[6970]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc1371f0 a2=3 a3=1 items=0 ppid=1 pid=6970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:24.541349 kernel: audit: type=1300 audit(1757722044.512:1749): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc1371f0 a2=3 a3=1 items=0 ppid=1 pid=6970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:24.512000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:24.546584 kernel: audit: type=1327 audit(1757722044.512:1749): proctitle=737368643A20636F7265205B707269765D Sep 13 00:07:24.547722 systemd-logind[1793]: New session 27 of user core. Sep 13 00:07:24.550970 systemd[1]: Started session-27.scope. Sep 13 00:07:24.563000 audit[6970]: USER_START pid=6970 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.576000 audit[6972]: CRED_ACQ pid=6972 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.577656 kernel: audit: type=1105 audit(1757722044.563:1750): pid=6970 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.593585 kernel: audit: type=1103 audit(1757722044.576:1751): pid=6972 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.871569 sshd[6970]: pam_unix(sshd:session): session closed for user core Sep 13 00:07:24.874000 audit[6970]: USER_END pid=6970 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.887241 systemd[1]: sshd@26-172.31.27.21:22-139.178.89.65:39720.service: Deactivated successfully. Sep 13 00:07:24.890427 systemd[1]: session-27.scope: Deactivated successfully. Sep 13 00:07:24.892829 systemd-logind[1793]: Session 27 logged out. Waiting for processes to exit. Sep 13 00:07:24.895039 systemd-logind[1793]: Removed session 27. Sep 13 00:07:24.875000 audit[6970]: CRED_DISP pid=6970 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.897013 kernel: audit: type=1106 audit(1757722044.874:1752): pid=6970 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.897160 kernel: audit: type=1104 audit(1757722044.875:1753): pid=6970 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Sep 13 00:07:24.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.27.21:22-139.178.89.65:39720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:07:27.151611 systemd[1]: run-containerd-runc-k8s.io-0c6a8092f464d33788044f39de246d40aa18d3f10dc3c7ba13aa89070aa040d9-runc.PsqxHj.mount: Deactivated successfully. Sep 13 00:07:38.398106 systemd[1]: cri-containerd-bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b.scope: Deactivated successfully. Sep 13 00:07:38.398723 systemd[1]: cri-containerd-bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b.scope: Consumed 7.166s CPU time. Sep 13 00:07:38.408277 kernel: kauditd_printk_skb: 1 callbacks suppressed Sep 13 00:07:38.408470 kernel: audit: type=1334 audit(1757722058.402:1755): prog-id=83 op=UNLOAD Sep 13 00:07:38.402000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:07:38.416535 kernel: audit: type=1334 audit(1757722058.402:1756): prog-id=108 op=UNLOAD Sep 13 00:07:38.402000 audit: BPF prog-id=108 op=UNLOAD Sep 13 00:07:38.421000 audit: BPF prog-id=124 op=UNLOAD Sep 13 00:07:38.421366 systemd[1]: cri-containerd-d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b.scope: Deactivated successfully. Sep 13 00:07:38.426143 kernel: audit: type=1334 audit(1757722058.421:1757): prog-id=124 op=UNLOAD Sep 13 00:07:38.422078 systemd[1]: cri-containerd-d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b.scope: Consumed 26.996s CPU time. Sep 13 00:07:38.427000 audit: BPF prog-id=127 op=UNLOAD Sep 13 00:07:38.431622 kernel: audit: type=1334 audit(1757722058.427:1758): prog-id=127 op=UNLOAD Sep 13 00:07:38.512839 env[1800]: time="2025-09-13T00:07:38.507865681Z" level=info msg="shim disconnected" id=bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b Sep 13 00:07:38.512839 env[1800]: time="2025-09-13T00:07:38.507939336Z" level=warning msg="cleaning up after shim disconnected" id=bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b namespace=k8s.io Sep 13 00:07:38.512839 env[1800]: time="2025-09-13T00:07:38.507962159Z" level=info msg="cleaning up dead shim" Sep 13 00:07:38.510678 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b-rootfs.mount: Deactivated successfully. Sep 13 00:07:38.517565 env[1800]: time="2025-09-13T00:07:38.516245692Z" level=info msg="shim disconnected" id=d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b Sep 13 00:07:38.517565 env[1800]: time="2025-09-13T00:07:38.516321675Z" level=warning msg="cleaning up after shim disconnected" id=d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b namespace=k8s.io Sep 13 00:07:38.517565 env[1800]: time="2025-09-13T00:07:38.516343850Z" level=info msg="cleaning up dead shim" Sep 13 00:07:38.526013 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b-rootfs.mount: Deactivated successfully. Sep 13 00:07:38.543093 env[1800]: time="2025-09-13T00:07:38.543034936Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:07:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7082 runtime=io.containerd.runc.v2\n" Sep 13 00:07:38.546395 env[1800]: time="2025-09-13T00:07:38.546337223Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:07:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7083 runtime=io.containerd.runc.v2\n" Sep 13 00:07:39.440395 kubelet[2910]: I0913 00:07:39.440337 2910 scope.go:117] "RemoveContainer" containerID="6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5" Sep 13 00:07:39.441208 kubelet[2910]: I0913 00:07:39.440983 2910 scope.go:117] "RemoveContainer" containerID="d8e8f2e64f21c87ff97c97a885fcf1df72ba7b73b2e5e727475e5a657a05ed4b" Sep 13 00:07:39.441325 kubelet[2910]: E0913 00:07:39.441247 2910 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-755d956888-p9tsq_tigera-operator(95e6604e-1601-4180-868e-2ff6a83b6ac3)\"" pod="tigera-operator/tigera-operator-755d956888-p9tsq" podUID="95e6604e-1601-4180-868e-2ff6a83b6ac3" Sep 13 00:07:39.445569 env[1800]: time="2025-09-13T00:07:39.445475981Z" level=info msg="RemoveContainer for \"6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5\"" Sep 13 00:07:39.448037 kubelet[2910]: I0913 00:07:39.447981 2910 scope.go:117] "RemoveContainer" containerID="bc3c0d4a156a86b4faab9714f620dde5e967906ffe7f0e2043576b240353142b" Sep 13 00:07:39.456407 env[1800]: time="2025-09-13T00:07:39.456329888Z" level=info msg="CreateContainer within sandbox \"0b029f99ec3afdd1ed1f1175e20bd837c785e398d5da7523f25265fa6c9cb1b7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Sep 13 00:07:39.459083 env[1800]: time="2025-09-13T00:07:39.458997772Z" level=info msg="RemoveContainer for \"6bc718e34f88e3238c43f70db2877cd01d261617ae3d90198aac7569d60675c5\" returns successfully" Sep 13 00:07:39.496875 env[1800]: time="2025-09-13T00:07:39.496784599Z" level=info msg="CreateContainer within sandbox \"0b029f99ec3afdd1ed1f1175e20bd837c785e398d5da7523f25265fa6c9cb1b7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"fee96719a18255850146fa76a674726410921d83409f51d1706968a6cbb307d0\"" Sep 13 00:07:39.499443 env[1800]: time="2025-09-13T00:07:39.499383676Z" level=info msg="StartContainer for \"fee96719a18255850146fa76a674726410921d83409f51d1706968a6cbb307d0\"" Sep 13 00:07:39.558821 systemd[1]: run-containerd-runc-k8s.io-fee96719a18255850146fa76a674726410921d83409f51d1706968a6cbb307d0-runc.4q5Bgh.mount: Deactivated successfully. Sep 13 00:07:39.569107 systemd[1]: Started cri-containerd-fee96719a18255850146fa76a674726410921d83409f51d1706968a6cbb307d0.scope. Sep 13 00:07:39.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631714 kernel: audit: type=1400 audit(1757722059.613:1759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631898 kernel: audit: type=1400 audit(1757722059.621:1760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631965 kernel: audit: type=1400 audit(1757722059.621:1761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.647407 kernel: audit: type=1400 audit(1757722059.621:1762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.655777 kernel: audit: type=1400 audit(1757722059.621:1763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.664487 kernel: audit: type=1400 audit(1757722059.621:1764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.621000 audit: BPF prog-id=249 op=LOAD Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2411 pid=7115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:39.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653936373139613138323535383530313436666137366136373437 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2411 pid=7115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:39.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653936373139613138323535383530313436666137366136373437 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.623000 audit: BPF prog-id=250 op=LOAD Sep 13 00:07:39.623000 audit[7115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2411 pid=7115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:39.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653936373139613138323535383530313436666137366136373437 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.631000 audit: BPF prog-id=251 op=LOAD Sep 13 00:07:39.631000 audit[7115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2411 pid=7115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:39.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653936373139613138323535383530313436666137366136373437 Sep 13 00:07:39.638000 audit: BPF prog-id=251 op=UNLOAD Sep 13 00:07:39.638000 audit: BPF prog-id=250 op=UNLOAD Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { perfmon } for pid=7115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit[7115]: AVC avc: denied { bpf } for pid=7115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:39.638000 audit: BPF prog-id=252 op=LOAD Sep 13 00:07:39.638000 audit[7115]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2411 pid=7115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:39.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653936373139613138323535383530313436666137366136373437 Sep 13 00:07:39.709195 env[1800]: time="2025-09-13T00:07:39.707643182Z" level=info msg="StartContainer for \"fee96719a18255850146fa76a674726410921d83409f51d1706968a6cbb307d0\" returns successfully" Sep 13 00:07:42.589000 audit[7124]: AVC avc: denied { watch } for pid=7124 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=6793 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:07:42.589000 audit[7124]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40005a5740 a2=fc6 a3=0 items=0 ppid=2411 pid=7124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:07:42.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:07:42.592000 audit[7124]: AVC avc: denied { watch } for pid=7124 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6789 scontext=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Sep 13 00:07:42.592000 audit[7124]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40003e8d20 a2=fc6 a3=0 items=0 ppid=2411 pid=7124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c653,c1000 key=(null) Sep 13 00:07:42.592000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Sep 13 00:07:45.162009 systemd[1]: cri-containerd-78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706.scope: Deactivated successfully. Sep 13 00:07:45.162713 systemd[1]: cri-containerd-78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706.scope: Consumed 4.594s CPU time. Sep 13 00:07:45.167000 audit: BPF prog-id=87 op=UNLOAD Sep 13 00:07:45.170961 kernel: kauditd_printk_skb: 57 callbacks suppressed Sep 13 00:07:45.171114 kernel: audit: type=1334 audit(1757722065.167:1779): prog-id=87 op=UNLOAD Sep 13 00:07:45.167000 audit: BPF prog-id=91 op=UNLOAD Sep 13 00:07:45.176461 kernel: audit: type=1334 audit(1757722065.167:1780): prog-id=91 op=UNLOAD Sep 13 00:07:45.219902 env[1800]: time="2025-09-13T00:07:45.205688561Z" level=info msg="shim disconnected" id=78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706 Sep 13 00:07:45.219902 env[1800]: time="2025-09-13T00:07:45.205780215Z" level=warning msg="cleaning up after shim disconnected" id=78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706 namespace=k8s.io Sep 13 00:07:45.219902 env[1800]: time="2025-09-13T00:07:45.205804911Z" level=info msg="cleaning up dead shim" Sep 13 00:07:45.218402 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706-rootfs.mount: Deactivated successfully. Sep 13 00:07:45.227599 env[1800]: time="2025-09-13T00:07:45.227533810Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:07:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7169 runtime=io.containerd.runc.v2\n" Sep 13 00:07:45.361859 kubelet[2910]: E0913 00:07:45.361314 2910 controller.go:195] "Failed to update lease" err="Put \"https://172.31.27.21:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-21?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Sep 13 00:07:45.481585 kubelet[2910]: I0913 00:07:45.481152 2910 scope.go:117] "RemoveContainer" containerID="78397e7f90a1cc1429388da097bf1cc817486c8fbfd1ebaa3710d7c2fb511706" Sep 13 00:07:45.485668 env[1800]: time="2025-09-13T00:07:45.485548880Z" level=info msg="CreateContainer within sandbox \"c9d6ba5c0c129f1aaf2fdbd454739aafdc1af417370ad605dec78f6179924a6e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Sep 13 00:07:45.517912 env[1800]: time="2025-09-13T00:07:45.517842594Z" level=info msg="CreateContainer within sandbox \"c9d6ba5c0c129f1aaf2fdbd454739aafdc1af417370ad605dec78f6179924a6e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"03d80345237c65fef9f71c002964aea4d5949a0fb8000623dc8f8a332747ef78\"" Sep 13 00:07:45.518991 env[1800]: time="2025-09-13T00:07:45.518930410Z" level=info msg="StartContainer for \"03d80345237c65fef9f71c002964aea4d5949a0fb8000623dc8f8a332747ef78\"" Sep 13 00:07:45.564675 systemd[1]: Started cri-containerd-03d80345237c65fef9f71c002964aea4d5949a0fb8000623dc8f8a332747ef78.scope. Sep 13 00:07:45.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.638471 kernel: audit: type=1400 audit(1757722065.622:1781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.638667 kernel: audit: type=1400 audit(1757722065.625:1782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.646525 kernel: audit: type=1400 audit(1757722065.625:1783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.654656 kernel: audit: type=1400 audit(1757722065.625:1784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.663164 kernel: audit: type=1400 audit(1757722065.625:1785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.684258 kernel: audit: type=1400 audit(1757722065.625:1786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.684481 kernel: audit: type=1400 audit(1757722065.625:1787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.692680 kernel: audit: type=1400 audit(1757722065.625:1788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.629000 audit: BPF prog-id=253 op=LOAD Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000197b38 a2=10 a3=0 items=0 ppid=2410 pid=7191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:45.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643830333435323337633635666566396637316330303239363461 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001975a0 a2=3c a3=0 items=0 ppid=2410 pid=7191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:45.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643830333435323337633635666566396637316330303239363461 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.637000 audit: BPF prog-id=254 op=LOAD Sep 13 00:07:45.637000 audit[7191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001978e0 a2=78 a3=0 items=0 ppid=2410 pid=7191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:45.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643830333435323337633635666566396637316330303239363461 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit: BPF prog-id=255 op=LOAD Sep 13 00:07:45.645000 audit[7191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000197670 a2=78 a3=0 items=0 ppid=2410 pid=7191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:45.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643830333435323337633635666566396637316330303239363461 Sep 13 00:07:45.645000 audit: BPF prog-id=255 op=UNLOAD Sep 13 00:07:45.645000 audit: BPF prog-id=254 op=UNLOAD Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { perfmon } for pid=7191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit[7191]: AVC avc: denied { bpf } for pid=7191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:07:45.645000 audit: BPF prog-id=256 op=LOAD Sep 13 00:07:45.645000 audit[7191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000197b40 a2=78 a3=0 items=0 ppid=2410 pid=7191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:07:45.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033643830333435323337633635666566396637316330303239363461 Sep 13 00:07:45.727158 env[1800]: time="2025-09-13T00:07:45.727077546Z" level=info msg="StartContainer for \"03d80345237c65fef9f71c002964aea4d5949a0fb8000623dc8f8a332747ef78\" returns successfully" Sep 13 00:07:49.049376 systemd[1]: run-containerd-runc-k8s.io-9a38628a4df4348582b5ac399ca57901ff032a8e533e430cede89ab5b43cbc0b-runc.4dcA7j.mount: Deactivated successfully.