May 15 10:41:12.663042 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 10:41:12.663057 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:41:12.663063 kernel: Disabled fast string operations May 15 10:41:12.663067 kernel: BIOS-provided physical RAM map: May 15 10:41:12.663070 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable May 15 10:41:12.663074 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved May 15 10:41:12.663080 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved May 15 10:41:12.663084 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable May 15 10:41:12.663088 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data May 15 10:41:12.663092 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS May 15 10:41:12.663095 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable May 15 10:41:12.663099 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved May 15 10:41:12.663103 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved May 15 10:41:12.663107 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 15 10:41:12.663113 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved May 15 10:41:12.663117 kernel: NX (Execute Disable) protection: active May 15 10:41:12.663122 kernel: SMBIOS 2.7 present. May 15 10:41:12.663126 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 May 15 10:41:12.663130 kernel: vmware: hypercall mode: 0x00 May 15 10:41:12.663134 kernel: Hypervisor detected: VMware May 15 10:41:12.663139 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz May 15 10:41:12.663144 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz May 15 10:41:12.663148 kernel: vmware: using clock offset of 6329444869 ns May 15 10:41:12.663152 kernel: tsc: Detected 3408.000 MHz processor May 15 10:41:12.663157 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 10:41:12.663161 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 10:41:12.663166 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 May 15 10:41:12.663170 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 10:41:12.663175 kernel: total RAM covered: 3072M May 15 10:41:12.663180 kernel: Found optimal setting for mtrr clean up May 15 10:41:12.663185 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G May 15 10:41:12.663190 kernel: Using GB pages for direct mapping May 15 10:41:12.663194 kernel: ACPI: Early table checksum verification disabled May 15 10:41:12.663198 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) May 15 10:41:12.663203 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) May 15 10:41:12.663207 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) May 15 10:41:12.663211 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) May 15 10:41:12.663216 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 15 10:41:12.663220 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 15 10:41:12.663225 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) May 15 10:41:12.663231 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) May 15 10:41:12.663236 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) May 15 10:41:12.663241 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) May 15 10:41:12.663246 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) May 15 10:41:12.663251 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) May 15 10:41:12.663256 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] May 15 10:41:12.663261 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] May 15 10:41:12.663265 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 15 10:41:12.663270 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 15 10:41:12.663275 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] May 15 10:41:12.663279 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] May 15 10:41:12.663284 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] May 15 10:41:12.663288 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] May 15 10:41:12.663294 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] May 15 10:41:12.663299 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] May 15 10:41:12.663303 kernel: system APIC only can use physical flat May 15 10:41:12.663308 kernel: Setting APIC routing to physical flat. May 15 10:41:12.663312 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 15 10:41:12.663317 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 15 10:41:12.663321 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 15 10:41:12.663326 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 15 10:41:12.666793 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 15 10:41:12.666801 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 15 10:41:12.666806 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 15 10:41:12.666811 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 15 10:41:12.666816 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 May 15 10:41:12.666821 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 May 15 10:41:12.666826 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 May 15 10:41:12.666831 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 May 15 10:41:12.666836 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 May 15 10:41:12.666840 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 May 15 10:41:12.666845 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 May 15 10:41:12.666851 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 May 15 10:41:12.666856 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 May 15 10:41:12.666860 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 May 15 10:41:12.666865 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 May 15 10:41:12.666870 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 May 15 10:41:12.666875 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 May 15 10:41:12.666880 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 May 15 10:41:12.666885 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 May 15 10:41:12.666890 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 May 15 10:41:12.666894 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 May 15 10:41:12.666900 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 May 15 10:41:12.666905 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 May 15 10:41:12.666910 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 May 15 10:41:12.666915 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 May 15 10:41:12.666919 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 May 15 10:41:12.666924 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 May 15 10:41:12.666929 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 May 15 10:41:12.666934 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 May 15 10:41:12.666939 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 May 15 10:41:12.666944 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 May 15 10:41:12.666950 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 May 15 10:41:12.666955 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 May 15 10:41:12.666960 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 May 15 10:41:12.666964 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 May 15 10:41:12.666969 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 May 15 10:41:12.666974 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 May 15 10:41:12.666979 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 May 15 10:41:12.666984 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 May 15 10:41:12.666988 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 May 15 10:41:12.666993 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 May 15 10:41:12.666999 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 May 15 10:41:12.667004 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 May 15 10:41:12.667009 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 May 15 10:41:12.667014 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 May 15 10:41:12.667019 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 May 15 10:41:12.667023 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 May 15 10:41:12.667028 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 May 15 10:41:12.667033 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 May 15 10:41:12.667038 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 May 15 10:41:12.667043 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 May 15 10:41:12.667048 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 May 15 10:41:12.667053 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 May 15 10:41:12.667058 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 May 15 10:41:12.667063 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 May 15 10:41:12.667068 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 May 15 10:41:12.667073 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 May 15 10:41:12.667081 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 May 15 10:41:12.667088 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 May 15 10:41:12.667093 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 May 15 10:41:12.667098 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 May 15 10:41:12.667103 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 May 15 10:41:12.667109 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 May 15 10:41:12.667114 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 May 15 10:41:12.667120 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 May 15 10:41:12.667125 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 May 15 10:41:12.667130 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 May 15 10:41:12.667135 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 May 15 10:41:12.667141 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 May 15 10:41:12.667147 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 May 15 10:41:12.667152 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 May 15 10:41:12.667157 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 May 15 10:41:12.667162 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 May 15 10:41:12.667167 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 May 15 10:41:12.667172 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 May 15 10:41:12.667177 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 May 15 10:41:12.667183 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 May 15 10:41:12.667188 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 May 15 10:41:12.667441 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 May 15 10:41:12.667450 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 May 15 10:41:12.667456 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 May 15 10:41:12.667461 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 May 15 10:41:12.667466 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 May 15 10:41:12.667471 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 May 15 10:41:12.667476 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 May 15 10:41:12.667481 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 May 15 10:41:12.667487 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 May 15 10:41:12.667492 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 May 15 10:41:12.667499 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 May 15 10:41:12.667504 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 May 15 10:41:12.667510 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 May 15 10:41:12.667515 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 May 15 10:41:12.667520 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 May 15 10:41:12.667525 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 May 15 10:41:12.667531 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 May 15 10:41:12.667536 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 May 15 10:41:12.667541 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 May 15 10:41:12.667546 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 May 15 10:41:12.667552 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 May 15 10:41:12.667557 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 May 15 10:41:12.667563 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 May 15 10:41:12.667568 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 May 15 10:41:12.667573 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 May 15 10:41:12.667578 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 May 15 10:41:12.667583 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 May 15 10:41:12.667588 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 May 15 10:41:12.667594 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 May 15 10:41:12.667599 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 May 15 10:41:12.667606 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 May 15 10:41:12.667611 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 May 15 10:41:12.667616 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 May 15 10:41:12.667621 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 May 15 10:41:12.667626 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 May 15 10:41:12.667632 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 May 15 10:41:12.667637 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 May 15 10:41:12.667642 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 May 15 10:41:12.667647 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 May 15 10:41:12.667654 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 May 15 10:41:12.667659 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 May 15 10:41:12.667664 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 May 15 10:41:12.667669 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 May 15 10:41:12.667674 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 May 15 10:41:12.667679 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 May 15 10:41:12.667685 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 May 15 10:41:12.667690 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 15 10:41:12.667695 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 15 10:41:12.667701 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug May 15 10:41:12.667707 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] May 15 10:41:12.667713 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] May 15 10:41:12.667718 kernel: Zone ranges: May 15 10:41:12.667724 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 10:41:12.667729 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] May 15 10:41:12.667734 kernel: Normal empty May 15 10:41:12.667740 kernel: Movable zone start for each node May 15 10:41:12.667745 kernel: Early memory node ranges May 15 10:41:12.667751 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] May 15 10:41:12.667757 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] May 15 10:41:12.667762 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] May 15 10:41:12.667767 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] May 15 10:41:12.667773 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:41:12.667778 kernel: On node 0, zone DMA: 98 pages in unavailable ranges May 15 10:41:12.667783 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges May 15 10:41:12.667789 kernel: ACPI: PM-Timer IO Port: 0x1008 May 15 10:41:12.667794 kernel: system APIC only can use physical flat May 15 10:41:12.667799 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) May 15 10:41:12.667805 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 15 10:41:12.667811 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 15 10:41:12.667816 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 15 10:41:12.667822 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 15 10:41:12.667827 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 15 10:41:12.667832 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 15 10:41:12.667837 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 15 10:41:12.667843 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 15 10:41:12.667848 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 15 10:41:12.667853 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 15 10:41:12.667859 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 15 10:41:12.667864 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 15 10:41:12.667869 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 15 10:41:12.667875 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 15 10:41:12.667880 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 15 10:41:12.667885 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 15 10:41:12.667890 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) May 15 10:41:12.667896 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) May 15 10:41:12.667901 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) May 15 10:41:12.667906 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) May 15 10:41:12.667913 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) May 15 10:41:12.667918 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) May 15 10:41:12.667923 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) May 15 10:41:12.667928 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) May 15 10:41:12.667934 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) May 15 10:41:12.667939 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) May 15 10:41:12.667944 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) May 15 10:41:12.667949 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) May 15 10:41:12.667954 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) May 15 10:41:12.667961 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) May 15 10:41:12.667966 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) May 15 10:41:12.667971 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) May 15 10:41:12.667976 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) May 15 10:41:12.668008 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) May 15 10:41:12.668016 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) May 15 10:41:12.668021 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) May 15 10:41:12.668027 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) May 15 10:41:12.668033 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) May 15 10:41:12.668038 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) May 15 10:41:12.668045 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) May 15 10:41:12.668050 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) May 15 10:41:12.668056 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) May 15 10:41:12.668061 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) May 15 10:41:12.668066 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) May 15 10:41:12.668071 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) May 15 10:41:12.668076 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) May 15 10:41:12.668081 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) May 15 10:41:12.668086 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) May 15 10:41:12.668093 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) May 15 10:41:12.668098 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) May 15 10:41:12.668104 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) May 15 10:41:12.668109 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) May 15 10:41:12.668114 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) May 15 10:41:12.668119 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) May 15 10:41:12.668124 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) May 15 10:41:12.668130 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) May 15 10:41:12.668135 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) May 15 10:41:12.668141 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) May 15 10:41:12.668147 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) May 15 10:41:12.668152 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) May 15 10:41:12.668157 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) May 15 10:41:12.668162 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) May 15 10:41:12.668167 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) May 15 10:41:12.668173 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) May 15 10:41:12.668178 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) May 15 10:41:12.668183 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) May 15 10:41:12.668188 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) May 15 10:41:12.668194 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) May 15 10:41:12.668200 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) May 15 10:41:12.668205 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) May 15 10:41:12.668210 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) May 15 10:41:12.668215 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) May 15 10:41:12.668221 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) May 15 10:41:12.668226 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) May 15 10:41:12.668231 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) May 15 10:41:12.668237 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) May 15 10:41:12.668243 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) May 15 10:41:12.668248 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) May 15 10:41:12.668253 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) May 15 10:41:12.668258 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) May 15 10:41:12.668263 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) May 15 10:41:12.668268 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) May 15 10:41:12.668274 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) May 15 10:41:12.668279 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) May 15 10:41:12.668284 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) May 15 10:41:12.668289 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) May 15 10:41:12.668295 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) May 15 10:41:12.668301 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) May 15 10:41:12.668306 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) May 15 10:41:12.668311 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) May 15 10:41:12.668317 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) May 15 10:41:12.668322 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) May 15 10:41:12.668332 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) May 15 10:41:12.668338 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) May 15 10:41:12.668343 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) May 15 10:41:12.668349 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) May 15 10:41:12.668355 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) May 15 10:41:12.668360 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) May 15 10:41:12.668365 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) May 15 10:41:12.668370 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) May 15 10:41:12.668375 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) May 15 10:41:12.668381 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) May 15 10:41:12.668386 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) May 15 10:41:12.668391 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) May 15 10:41:12.668396 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) May 15 10:41:12.668402 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) May 15 10:41:12.668408 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) May 15 10:41:12.668413 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) May 15 10:41:12.668418 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) May 15 10:41:12.668423 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) May 15 10:41:12.668429 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) May 15 10:41:12.668434 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) May 15 10:41:12.668439 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) May 15 10:41:12.668444 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) May 15 10:41:12.668450 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) May 15 10:41:12.668456 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) May 15 10:41:12.668461 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) May 15 10:41:12.668466 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) May 15 10:41:12.668471 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) May 15 10:41:12.668477 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) May 15 10:41:12.668482 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) May 15 10:41:12.668487 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) May 15 10:41:12.668492 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) May 15 10:41:12.668497 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) May 15 10:41:12.668503 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) May 15 10:41:12.668509 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) May 15 10:41:12.668514 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) May 15 10:41:12.668519 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 May 15 10:41:12.668525 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) May 15 10:41:12.668530 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 10:41:12.668535 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 May 15 10:41:12.668541 kernel: TSC deadline timer available May 15 10:41:12.668546 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs May 15 10:41:12.668552 kernel: [mem 0x80000000-0xefffffff] available for PCI devices May 15 10:41:12.668558 kernel: Booting paravirtualized kernel on VMware hypervisor May 15 10:41:12.668563 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 10:41:12.668569 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 May 15 10:41:12.668574 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 15 10:41:12.668580 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 15 10:41:12.668585 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 May 15 10:41:12.668590 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 May 15 10:41:12.668595 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 May 15 10:41:12.668601 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 May 15 10:41:12.668606 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 May 15 10:41:12.668611 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 May 15 10:41:12.668617 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 May 15 10:41:12.668629 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 May 15 10:41:12.668635 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 May 15 10:41:12.668641 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 May 15 10:41:12.668646 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 May 15 10:41:12.668652 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 May 15 10:41:12.668658 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 May 15 10:41:12.668663 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 May 15 10:41:12.668669 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 May 15 10:41:12.668675 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 May 15 10:41:12.668680 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 May 15 10:41:12.668686 kernel: Policy zone: DMA32 May 15 10:41:12.668692 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:41:12.668699 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:41:12.668705 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes May 15 10:41:12.668710 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes May 15 10:41:12.668716 kernel: printk: log_buf_len min size: 262144 bytes May 15 10:41:12.668722 kernel: printk: log_buf_len: 1048576 bytes May 15 10:41:12.668727 kernel: printk: early log buf free: 239728(91%) May 15 10:41:12.668733 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:41:12.668739 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 15 10:41:12.668744 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:41:12.668751 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 155976K reserved, 0K cma-reserved) May 15 10:41:12.668757 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 May 15 10:41:12.668763 kernel: ftrace: allocating 34585 entries in 136 pages May 15 10:41:12.668769 kernel: ftrace: allocated 136 pages with 2 groups May 15 10:41:12.668775 kernel: rcu: Hierarchical RCU implementation. May 15 10:41:12.668781 kernel: rcu: RCU event tracing is enabled. May 15 10:41:12.668788 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. May 15 10:41:12.668794 kernel: Rude variant of Tasks RCU enabled. May 15 10:41:12.668799 kernel: Tracing variant of Tasks RCU enabled. May 15 10:41:12.668805 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:41:12.668811 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 May 15 10:41:12.668816 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 May 15 10:41:12.668822 kernel: random: crng init done May 15 10:41:12.668827 kernel: Console: colour VGA+ 80x25 May 15 10:41:12.668833 kernel: printk: console [tty0] enabled May 15 10:41:12.668839 kernel: printk: console [ttyS0] enabled May 15 10:41:12.668845 kernel: ACPI: Core revision 20210730 May 15 10:41:12.668851 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns May 15 10:41:12.668856 kernel: APIC: Switch to symmetric I/O mode setup May 15 10:41:12.668862 kernel: x2apic enabled May 15 10:41:12.668869 kernel: Switched APIC routing to physical x2apic. May 15 10:41:12.668874 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 10:41:12.668880 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 15 10:41:12.668886 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) May 15 10:41:12.668892 kernel: Disabled fast string operations May 15 10:41:12.668898 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 15 10:41:12.668904 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 15 10:41:12.668909 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 10:41:12.668915 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 15 10:41:12.668921 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 15 10:41:12.668927 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 15 10:41:12.668933 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 15 10:41:12.668938 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 15 10:41:12.668945 kernel: RETBleed: Mitigation: Enhanced IBRS May 15 10:41:12.668951 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 10:41:12.668956 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 10:41:12.668962 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 15 10:41:12.668968 kernel: SRBDS: Unknown: Dependent on hypervisor status May 15 10:41:12.668973 kernel: GDS: Unknown: Dependent on hypervisor status May 15 10:41:12.668979 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 10:41:12.668985 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 10:41:12.668991 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 10:41:12.668997 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 10:41:12.669003 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. May 15 10:41:12.669008 kernel: Freeing SMP alternatives memory: 32K May 15 10:41:12.669014 kernel: pid_max: default: 131072 minimum: 1024 May 15 10:41:12.669020 kernel: LSM: Security Framework initializing May 15 10:41:12.669025 kernel: SELinux: Initializing. May 15 10:41:12.669031 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 15 10:41:12.669037 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 15 10:41:12.669042 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 15 10:41:12.669049 kernel: Performance Events: Skylake events, core PMU driver. May 15 10:41:12.669055 kernel: core: CPUID marked event: 'cpu cycles' unavailable May 15 10:41:12.669060 kernel: core: CPUID marked event: 'instructions' unavailable May 15 10:41:12.669066 kernel: core: CPUID marked event: 'bus cycles' unavailable May 15 10:41:12.669071 kernel: core: CPUID marked event: 'cache references' unavailable May 15 10:41:12.669077 kernel: core: CPUID marked event: 'cache misses' unavailable May 15 10:41:12.669082 kernel: core: CPUID marked event: 'branch instructions' unavailable May 15 10:41:12.669088 kernel: core: CPUID marked event: 'branch misses' unavailable May 15 10:41:12.669094 kernel: ... version: 1 May 15 10:41:12.669100 kernel: ... bit width: 48 May 15 10:41:12.669105 kernel: ... generic registers: 4 May 15 10:41:12.669111 kernel: ... value mask: 0000ffffffffffff May 15 10:41:12.669117 kernel: ... max period: 000000007fffffff May 15 10:41:12.669122 kernel: ... fixed-purpose events: 0 May 15 10:41:12.669128 kernel: ... event mask: 000000000000000f May 15 10:41:12.669133 kernel: signal: max sigframe size: 1776 May 15 10:41:12.669139 kernel: rcu: Hierarchical SRCU implementation. May 15 10:41:12.669146 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 15 10:41:12.669151 kernel: smp: Bringing up secondary CPUs ... May 15 10:41:12.669157 kernel: x86: Booting SMP configuration: May 15 10:41:12.669163 kernel: .... node #0, CPUs: #1 May 15 10:41:12.669168 kernel: Disabled fast string operations May 15 10:41:12.669174 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 May 15 10:41:12.669179 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 15 10:41:12.669185 kernel: smp: Brought up 1 node, 2 CPUs May 15 10:41:12.669190 kernel: smpboot: Max logical packages: 128 May 15 10:41:12.669196 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) May 15 10:41:12.669203 kernel: devtmpfs: initialized May 15 10:41:12.669209 kernel: x86/mm: Memory block size: 128MB May 15 10:41:12.669215 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) May 15 10:41:12.669221 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:41:12.669226 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) May 15 10:41:12.669232 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:41:12.669238 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:41:12.669243 kernel: audit: initializing netlink subsys (disabled) May 15 10:41:12.669249 kernel: audit: type=2000 audit(1747305671.061:1): state=initialized audit_enabled=0 res=1 May 15 10:41:12.669255 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:41:12.669261 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 10:41:12.669267 kernel: cpuidle: using governor menu May 15 10:41:12.669272 kernel: Simple Boot Flag at 0x36 set to 0x80 May 15 10:41:12.669278 kernel: ACPI: bus type PCI registered May 15 10:41:12.669284 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:41:12.669289 kernel: dca service started, version 1.12.1 May 15 10:41:12.669295 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) May 15 10:41:12.669301 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 May 15 10:41:12.669307 kernel: PCI: Using configuration type 1 for base access May 15 10:41:12.669313 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 10:41:12.669319 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:41:12.669324 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:41:12.669334 kernel: ACPI: Added _OSI(Module Device) May 15 10:41:12.669340 kernel: ACPI: Added _OSI(Processor Device) May 15 10:41:12.669345 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:41:12.669351 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:41:12.669356 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:41:12.669363 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:41:12.669369 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:41:12.669374 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:41:12.669380 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 15 10:41:12.669385 kernel: ACPI: Interpreter enabled May 15 10:41:12.669391 kernel: ACPI: PM: (supports S0 S1 S5) May 15 10:41:12.669397 kernel: ACPI: Using IOAPIC for interrupt routing May 15 10:41:12.669403 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 10:41:12.669408 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F May 15 10:41:12.669415 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) May 15 10:41:12.669488 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:41:12.669537 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] May 15 10:41:12.669585 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] May 15 10:41:12.669593 kernel: PCI host bridge to bus 0000:00 May 15 10:41:12.669641 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 10:41:12.669682 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] May 15 10:41:12.669724 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 10:41:12.669767 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 10:41:12.669807 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] May 15 10:41:12.669846 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] May 15 10:41:12.669899 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 May 15 10:41:12.669953 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 May 15 10:41:12.670006 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 May 15 10:41:12.670056 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a May 15 10:41:12.670101 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] May 15 10:41:12.670146 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 15 10:41:12.670191 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 15 10:41:12.670236 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 15 10:41:12.670280 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 15 10:41:12.670340 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 May 15 10:41:12.671400 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI May 15 10:41:12.671453 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB May 15 10:41:12.671503 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 May 15 10:41:12.671549 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] May 15 10:41:12.671594 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] May 15 10:41:12.671645 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 May 15 10:41:12.671691 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] May 15 10:41:12.671734 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] May 15 10:41:12.671778 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] May 15 10:41:12.671822 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] May 15 10:41:12.671866 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 10:41:12.671915 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 May 15 10:41:12.671966 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.672012 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold May 15 10:41:12.672059 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.672107 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold May 15 10:41:12.672157 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.672202 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold May 15 10:41:12.672252 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.672297 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold May 15 10:41:12.673384 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.673439 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold May 15 10:41:12.673489 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.673535 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold May 15 10:41:12.673587 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.673632 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold May 15 10:41:12.673679 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.673723 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold May 15 10:41:12.673814 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.673884 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold May 15 10:41:12.673935 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.673980 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold May 15 10:41:12.674029 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.674075 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold May 15 10:41:12.674122 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.674168 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold May 15 10:41:12.674216 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.674262 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold May 15 10:41:12.674309 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.675391 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold May 15 10:41:12.675444 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.675489 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold May 15 10:41:12.675540 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.675603 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold May 15 10:41:12.675652 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.675697 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold May 15 10:41:12.675746 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.675791 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold May 15 10:41:12.675844 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.675890 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold May 15 10:41:12.675937 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.675982 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold May 15 10:41:12.676030 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.676076 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold May 15 10:41:12.676127 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.676172 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold May 15 10:41:12.676221 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.676267 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold May 15 10:41:12.676314 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.677395 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold May 15 10:41:12.677450 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.677499 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold May 15 10:41:12.677548 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.677593 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold May 15 10:41:12.677642 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.677687 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold May 15 10:41:12.677739 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.677786 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold May 15 10:41:12.678048 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.678099 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold May 15 10:41:12.678152 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.679849 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold May 15 10:41:12.679912 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.679965 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold May 15 10:41:12.680015 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 May 15 10:41:12.680061 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold May 15 10:41:12.680107 kernel: pci_bus 0000:01: extended config space not accessible May 15 10:41:12.680154 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 15 10:41:12.680200 kernel: pci_bus 0000:02: extended config space not accessible May 15 10:41:12.680211 kernel: acpiphp: Slot [32] registered May 15 10:41:12.680217 kernel: acpiphp: Slot [33] registered May 15 10:41:12.680222 kernel: acpiphp: Slot [34] registered May 15 10:41:12.680228 kernel: acpiphp: Slot [35] registered May 15 10:41:12.680233 kernel: acpiphp: Slot [36] registered May 15 10:41:12.680239 kernel: acpiphp: Slot [37] registered May 15 10:41:12.680262 kernel: acpiphp: Slot [38] registered May 15 10:41:12.680268 kernel: acpiphp: Slot [39] registered May 15 10:41:12.680273 kernel: acpiphp: Slot [40] registered May 15 10:41:12.680279 kernel: acpiphp: Slot [41] registered May 15 10:41:12.680286 kernel: acpiphp: Slot [42] registered May 15 10:41:12.680292 kernel: acpiphp: Slot [43] registered May 15 10:41:12.680298 kernel: acpiphp: Slot [44] registered May 15 10:41:12.680304 kernel: acpiphp: Slot [45] registered May 15 10:41:12.680309 kernel: acpiphp: Slot [46] registered May 15 10:41:12.680315 kernel: acpiphp: Slot [47] registered May 15 10:41:12.680320 kernel: acpiphp: Slot [48] registered May 15 10:41:12.680326 kernel: acpiphp: Slot [49] registered May 15 10:41:12.680340 kernel: acpiphp: Slot [50] registered May 15 10:41:12.680348 kernel: acpiphp: Slot [51] registered May 15 10:41:12.680354 kernel: acpiphp: Slot [52] registered May 15 10:41:12.680359 kernel: acpiphp: Slot [53] registered May 15 10:41:12.680365 kernel: acpiphp: Slot [54] registered May 15 10:41:12.680370 kernel: acpiphp: Slot [55] registered May 15 10:41:12.680376 kernel: acpiphp: Slot [56] registered May 15 10:41:12.680382 kernel: acpiphp: Slot [57] registered May 15 10:41:12.680388 kernel: acpiphp: Slot [58] registered May 15 10:41:12.680393 kernel: acpiphp: Slot [59] registered May 15 10:41:12.680398 kernel: acpiphp: Slot [60] registered May 15 10:41:12.680405 kernel: acpiphp: Slot [61] registered May 15 10:41:12.680411 kernel: acpiphp: Slot [62] registered May 15 10:41:12.680416 kernel: acpiphp: Slot [63] registered May 15 10:41:12.680468 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) May 15 10:41:12.680515 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 15 10:41:12.680560 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 15 10:41:12.680604 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 10:41:12.680649 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) May 15 10:41:12.680696 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) May 15 10:41:12.680752 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) May 15 10:41:12.680800 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) May 15 10:41:12.680858 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) May 15 10:41:12.680911 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 May 15 10:41:12.680958 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] May 15 10:41:12.681005 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] May 15 10:41:12.681054 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 15 10:41:12.681099 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold May 15 10:41:12.681144 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 15 10:41:12.681190 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 15 10:41:12.681235 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 15 10:41:12.681279 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 15 10:41:12.681325 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 15 10:41:12.681377 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 15 10:41:12.681422 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 15 10:41:12.681467 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 15 10:41:12.681511 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 15 10:41:12.681556 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 15 10:41:12.681600 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 15 10:41:12.681644 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 15 10:41:12.681689 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 15 10:41:12.681736 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 15 10:41:12.681780 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 15 10:41:12.681823 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 15 10:41:12.681887 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 15 10:41:12.681946 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 10:41:12.681992 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 15 10:41:12.682036 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 15 10:41:12.682080 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 15 10:41:12.682124 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 15 10:41:12.682167 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 15 10:41:12.682211 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 15 10:41:12.682255 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 15 10:41:12.682301 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 15 10:41:12.682358 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 15 10:41:12.682409 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 May 15 10:41:12.682456 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] May 15 10:41:12.682503 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] May 15 10:41:12.682549 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] May 15 10:41:12.682595 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] May 15 10:41:12.682641 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 15 10:41:12.682689 kernel: pci 0000:0b:00.0: supports D1 D2 May 15 10:41:12.682734 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 15 10:41:12.682834 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 15 10:41:12.682880 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 15 10:41:12.682923 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 15 10:41:12.682968 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 15 10:41:12.683013 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 15 10:41:12.683057 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 15 10:41:12.683103 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 15 10:41:12.683147 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 15 10:41:12.683191 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 15 10:41:12.683234 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 15 10:41:12.683277 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 15 10:41:12.683321 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 15 10:41:12.683385 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 15 10:41:12.683433 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 15 10:41:12.683477 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 10:41:12.683521 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 15 10:41:12.683564 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 15 10:41:12.683608 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 10:41:12.683653 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 15 10:41:12.683697 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 15 10:41:12.683745 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 15 10:41:12.683792 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 15 10:41:12.683837 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 15 10:41:12.683880 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 15 10:41:12.683924 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 15 10:41:12.683967 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 15 10:41:12.684011 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 10:41:12.684055 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 15 10:41:12.684099 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 15 10:41:12.684144 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 15 10:41:12.684188 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 10:41:12.684233 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 15 10:41:12.684276 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 15 10:41:12.684321 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 15 10:41:12.684388 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 15 10:41:12.684434 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 15 10:41:12.684478 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 15 10:41:12.684523 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 15 10:41:12.684566 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 15 10:41:12.684610 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 15 10:41:12.684653 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 15 10:41:12.684696 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 10:41:12.684740 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 15 10:41:12.684783 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 15 10:41:12.684828 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 10:41:12.684872 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 15 10:41:12.684916 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 15 10:41:12.684960 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 15 10:41:12.685006 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 15 10:41:12.685049 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 15 10:41:12.685093 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 15 10:41:12.685137 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 15 10:41:12.685181 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 15 10:41:12.685226 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 10:41:12.685271 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 15 10:41:12.685315 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 15 10:41:12.685373 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 15 10:41:12.685417 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 15 10:41:12.685462 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 15 10:41:12.685506 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 15 10:41:12.685551 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 15 10:41:12.685595 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 15 10:41:12.685639 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 15 10:41:12.685682 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 15 10:41:12.685726 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 15 10:41:12.685771 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 15 10:41:12.685819 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 15 10:41:12.685872 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 10:41:12.685931 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 15 10:41:12.685975 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 15 10:41:12.686019 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 15 10:41:12.686064 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 15 10:41:12.686108 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 15 10:41:12.686152 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 15 10:41:12.686196 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 15 10:41:12.686239 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 15 10:41:12.686285 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 15 10:41:12.686398 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 15 10:41:12.687497 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 15 10:41:12.687549 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 10:41:12.687558 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 May 15 10:41:12.687565 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 May 15 10:41:12.687571 kernel: ACPI: PCI: Interrupt link LNKB disabled May 15 10:41:12.687576 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 10:41:12.687582 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 May 15 10:41:12.687590 kernel: iommu: Default domain type: Translated May 15 10:41:12.687596 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 10:41:12.687662 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device May 15 10:41:12.687720 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 10:41:12.687768 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible May 15 10:41:12.687776 kernel: vgaarb: loaded May 15 10:41:12.687782 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:41:12.687787 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:41:12.687795 kernel: PTP clock support registered May 15 10:41:12.687801 kernel: PCI: Using ACPI for IRQ routing May 15 10:41:12.687807 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 10:41:12.687812 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] May 15 10:41:12.687818 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] May 15 10:41:12.687823 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 May 15 10:41:12.687829 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter May 15 10:41:12.687834 kernel: clocksource: Switched to clocksource tsc-early May 15 10:41:12.687840 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:41:12.687846 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:41:12.687853 kernel: pnp: PnP ACPI init May 15 10:41:12.687900 kernel: system 00:00: [io 0x1000-0x103f] has been reserved May 15 10:41:12.687942 kernel: system 00:00: [io 0x1040-0x104f] has been reserved May 15 10:41:12.687981 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved May 15 10:41:12.688025 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved May 15 10:41:12.688430 kernel: pnp 00:06: [dma 2] May 15 10:41:12.688484 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved May 15 10:41:12.688527 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved May 15 10:41:12.701038 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved May 15 10:41:12.701058 kernel: pnp: PnP ACPI: found 8 devices May 15 10:41:12.701066 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 10:41:12.701072 kernel: NET: Registered PF_INET protocol family May 15 10:41:12.701078 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:41:12.701084 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 15 10:41:12.701092 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:41:12.701098 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 15 10:41:12.701104 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 15 10:41:12.701110 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 15 10:41:12.701116 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 15 10:41:12.701122 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 15 10:41:12.701127 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:41:12.701133 kernel: NET: Registered PF_XDP protocol family May 15 10:41:12.701196 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 May 15 10:41:12.701262 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 15 10:41:12.701313 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 15 10:41:12.701711 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 15 10:41:12.701767 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 15 10:41:12.701817 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 May 15 10:41:12.701865 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 May 15 10:41:12.701916 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 May 15 10:41:12.701963 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 May 15 10:41:12.702011 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 May 15 10:41:12.702059 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 May 15 10:41:12.702106 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 May 15 10:41:12.702166 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 May 15 10:41:12.702216 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 May 15 10:41:12.702263 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 May 15 10:41:12.702311 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 May 15 10:41:12.702374 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 May 15 10:41:12.702424 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 May 15 10:41:12.702474 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 May 15 10:41:12.702522 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 May 15 10:41:12.702569 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 May 15 10:41:12.702616 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 May 15 10:41:12.702685 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 May 15 10:41:12.702733 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] May 15 10:41:12.702780 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] May 15 10:41:12.702826 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 15 10:41:12.703027 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.703084 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 15 10:41:12.703134 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.703185 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 15 10:41:12.703233 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.703280 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 15 10:41:12.703334 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.703382 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 15 10:41:12.703427 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.703475 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 15 10:41:12.703520 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.703565 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 15 10:41:12.703611 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.703656 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 15 10:41:12.703703 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704041 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704093 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704141 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704188 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704233 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704278 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704325 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704385 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704430 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704500 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704560 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704618 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704664 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704709 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704755 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704803 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704848 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704893 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.704939 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 15 10:41:12.704984 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.705030 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 15 10:41:12.705076 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.705121 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 15 10:41:12.705169 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.705215 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 15 10:41:12.705259 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.705305 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 15 10:41:12.705651 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.705729 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 15 10:41:12.705798 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.705846 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 15 10:41:12.705892 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.705940 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 15 10:41:12.705987 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.706032 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 15 10:41:12.706077 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.706121 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 15 10:41:12.706167 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.706212 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 15 10:41:12.706257 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.706301 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 15 10:41:12.706664 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.706719 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 15 10:41:12.706766 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.706813 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707148 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.707202 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707257 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.707314 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707383 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.707432 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707488 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.707536 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707581 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.707635 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707682 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.707727 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707771 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.707814 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707869 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.707915 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 15 10:41:12.707972 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.708034 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 15 10:41:12.708078 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.708122 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 15 10:41:12.708165 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.708209 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 15 10:41:12.708264 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 15 10:41:12.708311 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 15 10:41:12.708401 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] May 15 10:41:12.708451 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 15 10:41:12.708495 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 15 10:41:12.708538 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 10:41:12.708721 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] May 15 10:41:12.708781 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 15 10:41:12.708829 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 15 10:41:12.709137 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 15 10:41:12.709194 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] May 15 10:41:12.709245 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 15 10:41:12.709291 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 15 10:41:12.709366 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 15 10:41:12.709415 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 15 10:41:12.709461 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 15 10:41:12.709506 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 15 10:41:12.709861 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 15 10:41:12.709912 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 15 10:41:12.709959 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 15 10:41:12.710003 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 15 10:41:12.710050 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 15 10:41:12.710095 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 15 10:41:12.710140 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 15 10:41:12.710184 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 10:41:12.710230 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 15 10:41:12.710276 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 15 10:41:12.710321 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 15 10:41:12.710382 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 15 10:41:12.710427 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 15 10:41:12.710473 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 15 10:41:12.710518 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 15 10:41:12.710563 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 15 10:41:12.710607 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 15 10:41:12.710656 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] May 15 10:41:12.710702 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 15 10:41:12.710779 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 15 10:41:12.710841 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 15 10:41:12.710886 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] May 15 10:41:12.710932 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 15 10:41:12.710977 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 15 10:41:12.711021 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 15 10:41:12.711066 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 15 10:41:12.711111 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 15 10:41:12.711155 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 15 10:41:12.711201 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 15 10:41:12.711246 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 15 10:41:12.711290 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 15 10:41:12.711362 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 15 10:41:12.711408 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 10:41:12.711452 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 15 10:41:12.711496 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 15 10:41:12.711848 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 10:41:12.711904 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 15 10:41:12.711970 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 15 10:41:12.712285 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 15 10:41:12.712354 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 15 10:41:12.712406 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 15 10:41:12.712622 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 15 10:41:12.712675 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 15 10:41:12.712722 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 15 10:41:12.712790 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 10:41:12.713119 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 15 10:41:12.713173 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 15 10:41:12.713225 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 15 10:41:12.713273 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 10:41:12.713320 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 15 10:41:12.713405 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 15 10:41:12.713488 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 15 10:41:12.713553 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 15 10:41:12.713689 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 15 10:41:12.713746 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 15 10:41:12.713791 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 15 10:41:12.713838 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 15 10:41:12.714147 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 15 10:41:12.714198 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 15 10:41:12.714246 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 10:41:12.714292 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 15 10:41:12.714371 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 15 10:41:12.714420 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 10:41:12.714464 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 15 10:41:12.714509 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 15 10:41:12.714553 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 15 10:41:12.714600 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 15 10:41:12.714644 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 15 10:41:12.714689 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 15 10:41:12.714733 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 15 10:41:12.714777 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 15 10:41:12.714821 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 10:41:12.714866 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 15 10:41:12.714910 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 15 10:41:12.714954 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 15 10:41:12.715000 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 15 10:41:12.715047 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 15 10:41:12.715091 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 15 10:41:12.715136 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 15 10:41:12.715180 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 15 10:41:12.715225 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 15 10:41:12.715269 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 15 10:41:12.715313 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 15 10:41:12.715365 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 15 10:41:12.715410 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 15 10:41:12.715457 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 10:41:12.715500 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 15 10:41:12.715544 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 15 10:41:12.715588 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 15 10:41:12.715632 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 15 10:41:12.715676 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 15 10:41:12.715721 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 15 10:41:12.715765 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 15 10:41:12.715809 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 15 10:41:12.715855 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 15 10:41:12.715899 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 15 10:41:12.715943 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 15 10:41:12.715987 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 10:41:12.716046 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] May 15 10:41:12.716087 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] May 15 10:41:12.716127 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] May 15 10:41:12.716166 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] May 15 10:41:12.716204 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] May 15 10:41:12.716250 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] May 15 10:41:12.716291 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] May 15 10:41:12.716341 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 10:41:12.716387 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] May 15 10:41:12.716427 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] May 15 10:41:12.716468 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] May 15 10:41:12.716529 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] May 15 10:41:12.716692 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] May 15 10:41:12.716773 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] May 15 10:41:12.716818 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] May 15 10:41:12.716860 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] May 15 10:41:12.717193 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] May 15 10:41:12.717243 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] May 15 10:41:12.717299 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] May 15 10:41:12.717362 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] May 15 10:41:12.717406 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] May 15 10:41:12.717449 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] May 15 10:41:12.717623 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] May 15 10:41:12.717671 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] May 15 10:41:12.717717 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] May 15 10:41:12.717762 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 10:41:12.717808 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] May 15 10:41:12.717851 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] May 15 10:41:12.717899 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] May 15 10:41:12.717941 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] May 15 10:41:12.718324 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] May 15 10:41:12.718396 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] May 15 10:41:12.718463 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] May 15 10:41:12.718513 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] May 15 10:41:12.718555 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] May 15 10:41:12.718600 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] May 15 10:41:12.718643 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] May 15 10:41:12.718687 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] May 15 10:41:12.718741 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] May 15 10:41:12.718786 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] May 15 10:41:12.718827 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] May 15 10:41:12.718873 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] May 15 10:41:12.718915 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 10:41:12.718977 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] May 15 10:41:12.719033 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 10:41:12.719090 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] May 15 10:41:12.719134 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] May 15 10:41:12.719303 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] May 15 10:41:12.719368 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] May 15 10:41:12.719416 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] May 15 10:41:12.719463 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 10:41:12.719790 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] May 15 10:41:12.719841 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] May 15 10:41:12.719889 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 10:41:12.719942 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] May 15 10:41:12.719989 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] May 15 10:41:12.720036 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] May 15 10:41:12.720087 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] May 15 10:41:12.720152 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] May 15 10:41:12.720198 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] May 15 10:41:12.720247 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] May 15 10:41:12.720291 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 10:41:12.720408 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] May 15 10:41:12.720454 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 10:41:12.720502 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] May 15 10:41:12.720760 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] May 15 10:41:12.720819 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] May 15 10:41:12.720864 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] May 15 10:41:12.720910 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] May 15 10:41:12.720974 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 10:41:12.721239 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] May 15 10:41:12.721286 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] May 15 10:41:12.721362 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] May 15 10:41:12.721436 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] May 15 10:41:12.722320 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] May 15 10:41:12.722388 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] May 15 10:41:12.722440 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] May 15 10:41:12.722774 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] May 15 10:41:12.722828 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] May 15 10:41:12.722872 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 10:41:12.722919 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] May 15 10:41:12.722961 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] May 15 10:41:12.723010 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] May 15 10:41:12.723052 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] May 15 10:41:12.723097 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] May 15 10:41:12.723139 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] May 15 10:41:12.723187 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] May 15 10:41:12.723245 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 10:41:12.723316 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 15 10:41:12.723325 kernel: PCI: CLS 32 bytes, default 64 May 15 10:41:12.723357 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 15 10:41:12.723364 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 15 10:41:12.723371 kernel: clocksource: Switched to clocksource tsc May 15 10:41:12.723378 kernel: Initialise system trusted keyrings May 15 10:41:12.723385 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 15 10:41:12.723391 kernel: Key type asymmetric registered May 15 10:41:12.723397 kernel: Asymmetric key parser 'x509' registered May 15 10:41:12.723404 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:41:12.723411 kernel: io scheduler mq-deadline registered May 15 10:41:12.723417 kernel: io scheduler kyber registered May 15 10:41:12.723423 kernel: io scheduler bfq registered May 15 10:41:12.723477 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 May 15 10:41:12.723525 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.723572 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 May 15 10:41:12.723618 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.723668 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 May 15 10:41:12.723712 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.723764 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 May 15 10:41:12.723811 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.723858 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 May 15 10:41:12.723903 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.723952 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 May 15 10:41:12.723999 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724045 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 May 15 10:41:12.724091 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724137 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 May 15 10:41:12.724185 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724246 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 May 15 10:41:12.724290 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724348 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 May 15 10:41:12.724396 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724441 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 May 15 10:41:12.724486 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724534 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 May 15 10:41:12.724579 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724624 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 May 15 10:41:12.724669 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724714 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 May 15 10:41:12.724759 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724806 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 May 15 10:41:12.724851 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724896 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 May 15 10:41:12.724941 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.724986 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 May 15 10:41:12.725033 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725095 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 May 15 10:41:12.725157 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725202 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 May 15 10:41:12.725247 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725292 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 May 15 10:41:12.725365 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725417 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 May 15 10:41:12.725481 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725527 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 May 15 10:41:12.725573 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725653 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 May 15 10:41:12.725701 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725748 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 May 15 10:41:12.725795 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725841 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 May 15 10:41:12.725887 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.725933 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 May 15 10:41:12.725981 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.726026 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 May 15 10:41:12.726075 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.726122 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 May 15 10:41:12.726169 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.726217 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 May 15 10:41:12.726265 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.726312 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 May 15 10:41:12.726366 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.726414 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 May 15 10:41:12.726461 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.726512 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 May 15 10:41:12.726559 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:41:12.726568 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 10:41:12.726575 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:41:12.726581 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 10:41:12.726587 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 May 15 10:41:12.726594 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 10:41:12.726601 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 10:41:12.726697 kernel: rtc_cmos 00:01: registered as rtc0 May 15 10:41:12.727071 kernel: rtc_cmos 00:01: setting system clock to 2025-05-15T10:41:12 UTC (1747305672) May 15 10:41:12.727135 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram May 15 10:41:12.727145 kernel: intel_pstate: CPU model not supported May 15 10:41:12.727151 kernel: NET: Registered PF_INET6 protocol family May 15 10:41:12.727158 kernel: Segment Routing with IPv6 May 15 10:41:12.727164 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:41:12.727173 kernel: NET: Registered PF_PACKET protocol family May 15 10:41:12.727179 kernel: Key type dns_resolver registered May 15 10:41:12.727186 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 10:41:12.727192 kernel: IPI shorthand broadcast: enabled May 15 10:41:12.727198 kernel: sched_clock: Marking stable (835305784, 231267215)->(1134670520, -68097521) May 15 10:41:12.727204 kernel: registered taskstats version 1 May 15 10:41:12.727210 kernel: Loading compiled-in X.509 certificates May 15 10:41:12.727217 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 10:41:12.727223 kernel: Key type .fscrypt registered May 15 10:41:12.727230 kernel: Key type fscrypt-provisioning registered May 15 10:41:12.727236 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:41:12.727243 kernel: ima: Allocated hash algorithm: sha1 May 15 10:41:12.727249 kernel: ima: No architecture policies found May 15 10:41:12.727255 kernel: clk: Disabling unused clocks May 15 10:41:12.727261 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 10:41:12.727267 kernel: Write protecting the kernel read-only data: 28672k May 15 10:41:12.727273 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 10:41:12.727279 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 10:41:12.727286 kernel: Run /init as init process May 15 10:41:12.727293 kernel: with arguments: May 15 10:41:12.727299 kernel: /init May 15 10:41:12.727321 kernel: with environment: May 15 10:41:12.727346 kernel: HOME=/ May 15 10:41:12.727353 kernel: TERM=linux May 15 10:41:12.727359 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:41:12.727367 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:41:12.727377 systemd[1]: Detected virtualization vmware. May 15 10:41:12.727384 systemd[1]: Detected architecture x86-64. May 15 10:41:12.727391 systemd[1]: Running in initrd. May 15 10:41:12.727397 systemd[1]: No hostname configured, using default hostname. May 15 10:41:12.727771 systemd[1]: Hostname set to . May 15 10:41:12.727783 systemd[1]: Initializing machine ID from random generator. May 15 10:41:12.727790 systemd[1]: Queued start job for default target initrd.target. May 15 10:41:12.727797 systemd[1]: Started systemd-ask-password-console.path. May 15 10:41:12.727805 systemd[1]: Reached target cryptsetup.target. May 15 10:41:12.727812 systemd[1]: Reached target paths.target. May 15 10:41:12.727818 systemd[1]: Reached target slices.target. May 15 10:41:12.727826 systemd[1]: Reached target swap.target. May 15 10:41:12.727832 systemd[1]: Reached target timers.target. May 15 10:41:12.727839 systemd[1]: Listening on iscsid.socket. May 15 10:41:12.727845 systemd[1]: Listening on iscsiuio.socket. May 15 10:41:12.727851 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:41:12.727859 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:41:12.727865 systemd[1]: Listening on systemd-journald.socket. May 15 10:41:12.727872 systemd[1]: Listening on systemd-networkd.socket. May 15 10:41:12.727878 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:41:12.727884 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:41:12.727891 systemd[1]: Reached target sockets.target. May 15 10:41:12.727898 systemd[1]: Starting kmod-static-nodes.service... May 15 10:41:12.727904 systemd[1]: Finished network-cleanup.service. May 15 10:41:12.727910 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:41:12.727918 systemd[1]: Starting systemd-journald.service... May 15 10:41:12.727924 systemd[1]: Starting systemd-modules-load.service... May 15 10:41:12.727931 systemd[1]: Starting systemd-resolved.service... May 15 10:41:12.727937 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:41:12.727943 systemd[1]: Finished kmod-static-nodes.service. May 15 10:41:12.727950 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:41:12.727956 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:41:12.727963 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:41:12.727969 kernel: audit: type=1130 audit(1747305672.662:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.727977 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:41:12.727984 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:41:12.727991 kernel: audit: type=1130 audit(1747305672.665:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.727997 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:41:12.728004 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:41:12.728010 systemd[1]: Started systemd-resolved.service. May 15 10:41:12.728017 systemd[1]: Reached target nss-lookup.target. May 15 10:41:12.728023 systemd[1]: Starting dracut-cmdline.service... May 15 10:41:12.728031 kernel: audit: type=1130 audit(1747305672.692:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.728038 kernel: audit: type=1130 audit(1747305672.692:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.728044 kernel: Bridge firewalling registered May 15 10:41:12.728050 kernel: SCSI subsystem initialized May 15 10:41:12.728057 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:41:12.728068 systemd-journald[217]: Journal started May 15 10:41:12.728102 systemd-journald[217]: Runtime Journal (/run/log/journal/dfe6aaea3c524eda87d944027541833c) is 4.8M, max 38.8M, 34.0M free. May 15 10:41:12.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.652830 systemd-modules-load[218]: Inserted module 'overlay' May 15 10:41:12.732135 systemd[1]: Started systemd-journald.service. May 15 10:41:12.732152 kernel: device-mapper: uevent: version 1.0.3 May 15 10:41:12.732161 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:41:12.685061 systemd-resolved[219]: Positive Trust Anchors: May 15 10:41:12.685067 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:41:12.735294 kernel: audit: type=1130 audit(1747305672.730:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.685086 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:41:12.688115 systemd-resolved[219]: Defaulting to hostname 'linux'. May 15 10:41:12.703755 systemd-modules-load[218]: Inserted module 'br_netfilter' May 15 10:41:12.736217 dracut-cmdline[233]: dracut-dracut-053 May 15 10:41:12.736217 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 15 10:41:12.736217 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:41:12.744370 kernel: audit: type=1130 audit(1747305672.735:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.736720 systemd-modules-load[218]: Inserted module 'dm_multipath' May 15 10:41:12.737081 systemd[1]: Finished systemd-modules-load.service. May 15 10:41:12.747116 kernel: audit: type=1130 audit(1747305672.743:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.737593 systemd[1]: Starting systemd-sysctl.service... May 15 10:41:12.743936 systemd[1]: Finished systemd-sysctl.service. May 15 10:41:12.763344 kernel: Loading iSCSI transport class v2.0-870. May 15 10:41:12.772345 kernel: iscsi: registered transport (tcp) May 15 10:41:12.788726 kernel: iscsi: registered transport (qla4xxx) May 15 10:41:12.788772 kernel: QLogic iSCSI HBA Driver May 15 10:41:12.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.805942 systemd[1]: Finished dracut-cmdline.service. May 15 10:41:12.809580 kernel: audit: type=1130 audit(1747305672.804:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:12.806791 systemd[1]: Starting dracut-pre-udev.service... May 15 10:41:12.846377 kernel: raid6: avx2x4 gen() 47122 MB/s May 15 10:41:12.862350 kernel: raid6: avx2x4 xor() 20337 MB/s May 15 10:41:12.879367 kernel: raid6: avx2x2 gen() 52308 MB/s May 15 10:41:12.896366 kernel: raid6: avx2x2 xor() 31210 MB/s May 15 10:41:12.913352 kernel: raid6: avx2x1 gen() 44276 MB/s May 15 10:41:12.930377 kernel: raid6: avx2x1 xor() 27652 MB/s May 15 10:41:12.947346 kernel: raid6: sse2x4 gen() 21212 MB/s May 15 10:41:12.964349 kernel: raid6: sse2x4 xor() 11890 MB/s May 15 10:41:12.981343 kernel: raid6: sse2x2 gen() 21426 MB/s May 15 10:41:12.998346 kernel: raid6: sse2x2 xor() 13350 MB/s May 15 10:41:13.015375 kernel: raid6: sse2x1 gen() 18159 MB/s May 15 10:41:13.032572 kernel: raid6: sse2x1 xor() 8887 MB/s May 15 10:41:13.032613 kernel: raid6: using algorithm avx2x2 gen() 52308 MB/s May 15 10:41:13.032627 kernel: raid6: .... xor() 31210 MB/s, rmw enabled May 15 10:41:13.033722 kernel: raid6: using avx2x2 recovery algorithm May 15 10:41:13.042343 kernel: xor: automatically using best checksumming function avx May 15 10:41:13.102355 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 10:41:13.106727 systemd[1]: Finished dracut-pre-udev.service. May 15 10:41:13.107356 systemd[1]: Starting systemd-udevd.service... May 15 10:41:13.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:13.105000 audit: BPF prog-id=7 op=LOAD May 15 10:41:13.105000 audit: BPF prog-id=8 op=LOAD May 15 10:41:13.110342 kernel: audit: type=1130 audit(1747305673.105:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:13.117672 systemd-udevd[415]: Using default interface naming scheme 'v252'. May 15 10:41:13.120589 systemd[1]: Started systemd-udevd.service. May 15 10:41:13.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:13.121118 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:41:13.127626 dracut-pre-trigger[418]: rd.md=0: removing MD RAID activation May 15 10:41:13.143375 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:41:13.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:13.144200 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:41:13.204868 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:41:13.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:13.256343 kernel: VMware PVSCSI driver - version 1.0.7.0-k May 15 10:41:13.261123 kernel: vmw_pvscsi: using 64bit dma May 15 10:41:13.261142 kernel: vmw_pvscsi: max_id: 16 May 15 10:41:13.261150 kernel: vmw_pvscsi: setting ring_pages to 8 May 15 10:41:13.264342 kernel: libata version 3.00 loaded. May 15 10:41:13.266346 kernel: ata_piix 0000:00:07.1: version 2.13 May 15 10:41:13.281054 kernel: scsi host0: ata_piix May 15 10:41:13.281274 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI May 15 10:41:13.281284 kernel: scsi host2: ata_piix May 15 10:41:13.281448 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 May 15 10:41:13.281457 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 May 15 10:41:13.283413 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 May 15 10:41:13.289670 kernel: vmw_pvscsi: enabling reqCallThreshold May 15 10:41:13.289686 kernel: vmw_pvscsi: driver-based request coalescing enabled May 15 10:41:13.289694 kernel: vmw_pvscsi: using MSI-X May 15 10:41:13.289705 kernel: scsi host1: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 May 15 10:41:13.289792 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #1 May 15 10:41:13.293437 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps May 15 10:41:13.293522 kernel: scsi 1:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 May 15 10:41:13.293703 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:41:13.445349 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 May 15 10:41:13.451340 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 May 15 10:41:13.462827 kernel: AVX2 version of gcm_enc/dec engaged. May 15 10:41:13.462856 kernel: AES CTR mode by8 optimization enabled May 15 10:41:13.467343 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 May 15 10:41:13.473697 kernel: sd 1:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) May 15 10:41:13.479806 kernel: sd 1:0:0:0: [sda] Write Protect is off May 15 10:41:13.479875 kernel: sd 1:0:0:0: [sda] Mode Sense: 31 00 00 00 May 15 10:41:13.479934 kernel: sd 1:0:0:0: [sda] Cache data unavailable May 15 10:41:13.479991 kernel: sd 1:0:0:0: [sda] Assuming drive cache: write through May 15 10:41:13.480050 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 10:41:13.480059 kernel: sd 1:0:0:0: [sda] Attached SCSI disk May 15 10:41:13.483358 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray May 15 10:41:13.502283 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 10:41:13.502294 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 10:41:13.526346 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (469) May 15 10:41:13.531154 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:41:13.532880 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:41:13.533115 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:41:13.535317 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:41:13.537669 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:41:13.538311 systemd[1]: Starting disk-uuid.service... May 15 10:41:13.562349 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 10:41:13.568349 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 10:41:14.568348 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 10:41:14.568525 disk-uuid[548]: The operation has completed successfully. May 15 10:41:14.609645 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:41:14.609954 systemd[1]: Finished disk-uuid.service. May 15 10:41:14.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:14.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:14.610703 systemd[1]: Starting verity-setup.service... May 15 10:41:14.621342 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 15 10:41:14.704897 systemd[1]: Found device dev-mapper-usr.device. May 15 10:41:14.705784 systemd[1]: Mounting sysusr-usr.mount... May 15 10:41:14.707766 systemd[1]: Finished verity-setup.service. May 15 10:41:14.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:14.902802 systemd[1]: Mounted sysusr-usr.mount. May 15 10:41:14.903346 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:41:14.903512 systemd[1]: Starting afterburn-network-kargs.service... May 15 10:41:14.903977 systemd[1]: Starting ignition-setup.service... May 15 10:41:14.917985 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:41:14.918016 kernel: BTRFS info (device sda6): using free space tree May 15 10:41:14.918025 kernel: BTRFS info (device sda6): has skinny extents May 15 10:41:14.924345 kernel: BTRFS info (device sda6): enabling ssd optimizations May 15 10:41:14.929146 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:41:14.933985 systemd[1]: Finished ignition-setup.service. May 15 10:41:14.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:14.935206 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:41:14.985182 systemd[1]: Finished afterburn-network-kargs.service. May 15 10:41:14.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:14.985808 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:41:15.032983 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:41:15.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.032000 audit: BPF prog-id=9 op=LOAD May 15 10:41:15.034058 systemd[1]: Starting systemd-networkd.service... May 15 10:41:15.048440 systemd-networkd[733]: lo: Link UP May 15 10:41:15.048446 systemd-networkd[733]: lo: Gained carrier May 15 10:41:15.048744 systemd-networkd[733]: Enumeration completed May 15 10:41:15.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.049029 systemd[1]: Started systemd-networkd.service. May 15 10:41:15.049173 systemd[1]: Reached target network.target. May 15 10:41:15.049219 systemd-networkd[733]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. May 15 10:41:15.049778 systemd[1]: Starting iscsiuio.service... May 15 10:41:15.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.054145 systemd[1]: Started iscsiuio.service. May 15 10:41:15.054861 systemd[1]: Starting iscsid.service... May 15 10:41:15.058708 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 15 10:41:15.058863 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 15 10:41:15.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.058390 systemd[1]: Started iscsid.service. May 15 10:41:15.059267 iscsid[738]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:41:15.059267 iscsid[738]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:41:15.059267 iscsid[738]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:41:15.059267 iscsid[738]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:41:15.059267 iscsid[738]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:41:15.059267 iscsid[738]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:41:15.058993 systemd[1]: Starting dracut-initqueue.service... May 15 10:41:15.061470 systemd-networkd[733]: ens192: Link UP May 15 10:41:15.061474 systemd-networkd[733]: ens192: Gained carrier May 15 10:41:15.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.065876 systemd[1]: Finished dracut-initqueue.service. May 15 10:41:15.066025 systemd[1]: Reached target remote-fs-pre.target. May 15 10:41:15.066120 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:41:15.066446 systemd[1]: Reached target remote-fs.target. May 15 10:41:15.067564 systemd[1]: Starting dracut-pre-mount.service... May 15 10:41:15.069876 ignition[604]: Ignition 2.14.0 May 15 10:41:15.069882 ignition[604]: Stage: fetch-offline May 15 10:41:15.069914 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:41:15.069929 ignition[604]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:41:15.072870 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:41:15.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.073364 systemd[1]: Finished dracut-pre-mount.service. May 15 10:41:15.072955 ignition[604]: parsed url from cmdline: "" May 15 10:41:15.072957 ignition[604]: no config URL provided May 15 10:41:15.072960 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:41:15.072965 ignition[604]: no config at "/usr/lib/ignition/user.ign" May 15 10:41:15.073835 ignition[604]: config successfully fetched May 15 10:41:15.073852 ignition[604]: parsing config with SHA512: 24a1bbc11b189b582c480c9529a9bc81b60231bafb5b543ba2b02419687f2d8aa1e0853746da3f261767390181ba10275c59a44a9607bc55e1c7ba6e88c65a8a May 15 10:41:15.083531 unknown[604]: fetched base config from "system" May 15 10:41:15.083718 unknown[604]: fetched user config from "vmware" May 15 10:41:15.084145 ignition[604]: fetch-offline: fetch-offline passed May 15 10:41:15.084314 ignition[604]: Ignition finished successfully May 15 10:41:15.084975 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:41:15.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.085146 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:41:15.085608 systemd[1]: Starting ignition-kargs.service... May 15 10:41:15.090690 ignition[752]: Ignition 2.14.0 May 15 10:41:15.090700 ignition[752]: Stage: kargs May 15 10:41:15.090772 ignition[752]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:41:15.090783 ignition[752]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:41:15.092022 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:41:15.093524 ignition[752]: kargs: kargs passed May 15 10:41:15.093553 ignition[752]: Ignition finished successfully May 15 10:41:15.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.094365 systemd[1]: Finished ignition-kargs.service. May 15 10:41:15.094975 systemd[1]: Starting ignition-disks.service... May 15 10:41:15.099583 ignition[758]: Ignition 2.14.0 May 15 10:41:15.099837 ignition[758]: Stage: disks May 15 10:41:15.100014 ignition[758]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:41:15.100166 ignition[758]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:41:15.101480 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:41:15.103211 ignition[758]: disks: disks passed May 15 10:41:15.103259 ignition[758]: Ignition finished successfully May 15 10:41:15.103912 systemd[1]: Finished ignition-disks.service. May 15 10:41:15.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.104108 systemd[1]: Reached target initrd-root-device.target. May 15 10:41:15.104223 systemd[1]: Reached target local-fs-pre.target. May 15 10:41:15.104396 systemd[1]: Reached target local-fs.target. May 15 10:41:15.104553 systemd[1]: Reached target sysinit.target. May 15 10:41:15.104710 systemd[1]: Reached target basic.target. May 15 10:41:15.105373 systemd[1]: Starting systemd-fsck-root.service... May 15 10:41:15.121881 systemd-fsck[766]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 15 10:41:15.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.123233 systemd[1]: Finished systemd-fsck-root.service. May 15 10:41:15.123809 systemd[1]: Mounting sysroot.mount... May 15 10:41:15.131345 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:41:15.131606 systemd[1]: Mounted sysroot.mount. May 15 10:41:15.131860 systemd[1]: Reached target initrd-root-fs.target. May 15 10:41:15.132811 systemd[1]: Mounting sysroot-usr.mount... May 15 10:41:15.133312 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:41:15.133511 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:41:15.133707 systemd[1]: Reached target ignition-diskful.target. May 15 10:41:15.134615 systemd[1]: Mounted sysroot-usr.mount. May 15 10:41:15.135231 systemd[1]: Starting initrd-setup-root.service... May 15 10:41:15.138145 initrd-setup-root[776]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:41:15.141483 initrd-setup-root[784]: cut: /sysroot/etc/group: No such file or directory May 15 10:41:15.143739 initrd-setup-root[792]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:41:15.145967 initrd-setup-root[800]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:41:15.174272 systemd[1]: Finished initrd-setup-root.service. May 15 10:41:15.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.174866 systemd[1]: Starting ignition-mount.service... May 15 10:41:15.175323 systemd[1]: Starting sysroot-boot.service... May 15 10:41:15.179451 bash[817]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:41:15.184965 ignition[818]: INFO : Ignition 2.14.0 May 15 10:41:15.185214 ignition[818]: INFO : Stage: mount May 15 10:41:15.185402 ignition[818]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:41:15.185553 ignition[818]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:41:15.187023 ignition[818]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:41:15.189647 ignition[818]: INFO : mount: mount passed May 15 10:41:15.189838 ignition[818]: INFO : Ignition finished successfully May 15 10:41:15.190428 systemd[1]: Finished ignition-mount.service. May 15 10:41:15.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.209717 systemd[1]: Finished sysroot-boot.service. May 15 10:41:15.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:15.869958 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:41:15.947356 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (827) May 15 10:41:15.959532 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:41:15.959554 kernel: BTRFS info (device sda6): using free space tree May 15 10:41:15.959563 kernel: BTRFS info (device sda6): has skinny extents May 15 10:41:16.001350 kernel: BTRFS info (device sda6): enabling ssd optimizations May 15 10:41:16.013629 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:41:16.014203 systemd[1]: Starting ignition-files.service... May 15 10:41:16.023110 ignition[847]: INFO : Ignition 2.14.0 May 15 10:41:16.023110 ignition[847]: INFO : Stage: files May 15 10:41:16.023488 ignition[847]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:41:16.023488 ignition[847]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:41:16.024439 ignition[847]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:41:16.041197 ignition[847]: DEBUG : files: compiled without relabeling support, skipping May 15 10:41:16.044993 ignition[847]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:41:16.045212 ignition[847]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:41:16.071798 ignition[847]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:41:16.072169 ignition[847]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:41:16.082668 unknown[847]: wrote ssh authorized keys file for user: core May 15 10:41:16.083285 ignition[847]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:41:16.091406 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 15 10:41:16.091406 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 15 10:41:16.155125 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:41:16.269890 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 15 10:41:16.270162 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:41:16.270482 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:41:16.270678 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:41:16.270935 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:41:16.271131 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:41:16.271368 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:41:16.271550 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:41:16.271773 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:41:16.272170 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:41:16.272400 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:41:16.272587 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:41:16.272841 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:41:16.273276 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 15 10:41:16.273490 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 15 10:41:16.276811 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem219122524" May 15 10:41:16.277021 ignition[847]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem219122524": device or resource busy May 15 10:41:16.277225 ignition[847]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem219122524", trying btrfs: device or resource busy May 15 10:41:16.277447 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem219122524" May 15 10:41:16.277686 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem219122524" May 15 10:41:16.278350 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem219122524" May 15 10:41:16.278561 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem219122524" May 15 10:41:16.278744 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 15 10:41:16.278938 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:41:16.279179 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 15 10:41:16.279736 systemd[1]: mnt-oem219122524.mount: Deactivated successfully. May 15 10:41:16.600445 systemd-networkd[733]: ens192: Gained IPv6LL May 15 10:41:16.770074 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 15 10:41:17.016420 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:41:17.017001 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 15 10:41:17.017353 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 15 10:41:17.017608 ignition[847]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" May 15 10:41:17.017792 ignition[847]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" May 15 10:41:17.017976 ignition[847]: INFO : files: op(11): [started] processing unit "prepare-helm.service" May 15 10:41:17.018192 ignition[847]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:41:17.018762 ignition[847]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:41:17.019008 ignition[847]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" May 15 10:41:17.019198 ignition[847]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" May 15 10:41:17.019425 ignition[847]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:41:17.019750 ignition[847]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:41:17.020002 ignition[847]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" May 15 10:41:17.020204 ignition[847]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" May 15 10:41:17.020475 ignition[847]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" May 15 10:41:17.020675 ignition[847]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" May 15 10:41:17.020901 ignition[847]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:41:17.021102 ignition[847]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:41:17.021304 ignition[847]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:41:17.076698 ignition[847]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:41:17.076956 ignition[847]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:41:17.077213 ignition[847]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:41:17.077459 ignition[847]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:41:17.077644 ignition[847]: INFO : files: files passed May 15 10:41:17.077779 ignition[847]: INFO : Ignition finished successfully May 15 10:41:17.081209 kernel: kauditd_printk_skb: 24 callbacks suppressed May 15 10:41:17.081236 kernel: audit: type=1130 audit(1747305677.077:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.078628 systemd[1]: Finished ignition-files.service. May 15 10:41:17.079896 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:41:17.082380 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:41:17.082809 systemd[1]: Starting ignition-quench.service... May 15 10:41:17.086017 initrd-setup-root-after-ignition[873]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:41:17.086364 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:41:17.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.086728 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:41:17.086768 systemd[1]: Finished ignition-quench.service. May 15 10:41:17.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.089855 systemd[1]: Reached target ignition-complete.target. May 15 10:41:17.095402 kernel: audit: type=1130 audit(1747305677.085:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.095420 kernel: audit: type=1130 audit(1747305677.088:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.095428 kernel: audit: type=1131 audit(1747305677.088:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.095540 systemd[1]: Starting initrd-parse-etc.service... May 15 10:41:17.103967 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:41:17.104184 systemd[1]: Finished initrd-parse-etc.service. May 15 10:41:17.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.104527 systemd[1]: Reached target initrd-fs.target. May 15 10:41:17.109247 kernel: audit: type=1130 audit(1747305677.103:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.109263 kernel: audit: type=1131 audit(1747305677.103:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.109305 systemd[1]: Reached target initrd.target. May 15 10:41:17.109443 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:41:17.109915 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:41:17.116541 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:41:17.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.119347 kernel: audit: type=1130 audit(1747305677.115:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.117261 systemd[1]: Starting initrd-cleanup.service... May 15 10:41:17.124510 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:41:17.124559 systemd[1]: Finished initrd-cleanup.service. May 15 10:41:17.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.125103 systemd[1]: Stopped target nss-lookup.target. May 15 10:41:17.129558 kernel: audit: type=1130 audit(1747305677.123:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.129571 kernel: audit: type=1131 audit(1747305677.123:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.129625 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:41:17.129847 systemd[1]: Stopped target timers.target. May 15 10:41:17.130067 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:41:17.130217 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:41:17.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.130498 systemd[1]: Stopped target initrd.target. May 15 10:41:17.132947 systemd[1]: Stopped target basic.target. May 15 10:41:17.133148 systemd[1]: Stopped target ignition-complete.target. May 15 10:41:17.133344 kernel: audit: type=1131 audit(1747305677.129:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.133393 systemd[1]: Stopped target ignition-diskful.target. May 15 10:41:17.133601 systemd[1]: Stopped target initrd-root-device.target. May 15 10:41:17.133823 systemd[1]: Stopped target remote-fs.target. May 15 10:41:17.134024 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:41:17.134243 systemd[1]: Stopped target sysinit.target. May 15 10:41:17.134450 systemd[1]: Stopped target local-fs.target. May 15 10:41:17.134646 systemd[1]: Stopped target local-fs-pre.target. May 15 10:41:17.134848 systemd[1]: Stopped target swap.target. May 15 10:41:17.135042 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:41:17.135203 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:41:17.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.135545 systemd[1]: Stopped target cryptsetup.target. May 15 10:41:17.135749 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:41:17.135899 systemd[1]: Stopped dracut-initqueue.service. May 15 10:41:17.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.136174 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:41:17.136371 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:41:17.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.136636 systemd[1]: Stopped target paths.target. May 15 10:41:17.136831 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:41:17.138359 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:41:17.138573 systemd[1]: Stopped target slices.target. May 15 10:41:17.138767 systemd[1]: Stopped target sockets.target. May 15 10:41:17.138977 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:41:17.139113 systemd[1]: Closed iscsid.socket. May 15 10:41:17.139324 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:41:17.139538 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:41:17.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.139817 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:41:17.139965 systemd[1]: Stopped ignition-files.service. May 15 10:41:17.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.140691 systemd[1]: Stopping ignition-mount.service... May 15 10:41:17.141074 systemd[1]: Stopping iscsiuio.service... May 15 10:41:17.141624 systemd[1]: Stopping sysroot-boot.service... May 15 10:41:17.141859 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:41:17.142029 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:41:17.142454 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:41:17.142614 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:41:17.146534 ignition[886]: INFO : Ignition 2.14.0 May 15 10:41:17.146534 ignition[886]: INFO : Stage: umount May 15 10:41:17.146534 ignition[886]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:41:17.146534 ignition[886]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:41:17.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.147461 ignition[886]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:41:17.147726 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:41:17.147919 systemd[1]: Stopped iscsiuio.service. May 15 10:41:17.148190 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:41:17.148356 systemd[1]: Closed iscsiuio.socket. May 15 10:41:17.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.149526 ignition[886]: INFO : umount: umount passed May 15 10:41:17.149526 ignition[886]: INFO : Ignition finished successfully May 15 10:41:17.150109 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:41:17.150295 systemd[1]: Stopped ignition-mount.service. May 15 10:41:17.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.150606 systemd[1]: Stopped target network.target. May 15 10:41:17.150813 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:41:17.150963 systemd[1]: Stopped ignition-disks.service. May 15 10:41:17.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.151219 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:41:17.151375 systemd[1]: Stopped ignition-kargs.service. May 15 10:41:17.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.151627 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:41:17.151776 systemd[1]: Stopped ignition-setup.service. May 15 10:41:17.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.152086 systemd[1]: Stopping systemd-networkd.service... May 15 10:41:17.152403 systemd[1]: Stopping systemd-resolved.service... May 15 10:41:17.154914 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:41:17.155111 systemd[1]: Stopped systemd-networkd.service. May 15 10:41:17.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.155644 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:41:17.155798 systemd[1]: Closed systemd-networkd.socket. May 15 10:41:17.157123 systemd[1]: Stopping network-cleanup.service... May 15 10:41:17.157393 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:41:17.157604 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:41:17.157854 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. May 15 10:41:17.158012 systemd[1]: Stopped afterburn-network-kargs.service. May 15 10:41:17.158248 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:41:17.158564 systemd[1]: Stopped systemd-sysctl.service. May 15 10:41:17.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.157000 audit: BPF prog-id=9 op=UNLOAD May 15 10:41:17.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.158919 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:41:17.159076 systemd[1]: Stopped systemd-modules-load.service. May 15 10:41:17.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.161349 systemd[1]: Stopping systemd-udevd.service... May 15 10:41:17.162297 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:41:17.163489 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:41:17.163680 systemd[1]: Stopped systemd-resolved.service. May 15 10:41:17.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.164321 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:41:17.164667 systemd[1]: Stopped systemd-udevd.service. May 15 10:41:17.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.165475 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:41:17.165692 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:41:17.165925 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:41:17.166076 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:41:17.166397 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:41:17.166548 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:41:17.165000 audit: BPF prog-id=6 op=UNLOAD May 15 10:41:17.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.166834 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:41:17.166981 systemd[1]: Stopped dracut-cmdline.service. May 15 10:41:17.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.167238 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:41:17.167394 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:41:17.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.168048 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:41:17.168346 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 10:41:17.168511 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 10:41:17.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.168834 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:41:17.168985 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:41:17.169206 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:41:17.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.169478 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:41:17.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.170458 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 10:41:17.170920 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:41:17.171103 systemd[1]: Stopped network-cleanup.service. May 15 10:41:17.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.171512 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:41:17.171697 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:41:17.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.216521 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:41:17.500798 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:41:17.501040 systemd[1]: Stopped sysroot-boot.service. May 15 10:41:17.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.501384 systemd[1]: Reached target initrd-switch-root.target. May 15 10:41:17.501604 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:41:17.501759 systemd[1]: Stopped initrd-setup-root.service. May 15 10:41:17.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:17.502451 systemd[1]: Starting initrd-switch-root.service... May 15 10:41:17.509186 systemd[1]: Switching root. May 15 10:41:17.526622 iscsid[738]: iscsid shutting down. May 15 10:41:17.526812 systemd-journald[217]: Journal stopped May 15 10:41:19.865787 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). May 15 10:41:19.865807 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:41:19.865815 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:41:19.865821 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:41:19.865827 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:41:19.865833 kernel: SELinux: policy capability open_perms=1 May 15 10:41:19.865840 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:41:19.865845 kernel: SELinux: policy capability always_check_network=0 May 15 10:41:19.865851 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:41:19.865856 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:41:19.865862 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:41:19.865867 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:41:19.865876 systemd[1]: Successfully loaded SELinux policy in 50.305ms. May 15 10:41:19.865904 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.326ms. May 15 10:41:19.865914 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:41:19.865921 systemd[1]: Detected virtualization vmware. May 15 10:41:19.865929 systemd[1]: Detected architecture x86-64. May 15 10:41:19.865936 systemd[1]: Detected first boot. May 15 10:41:19.865942 systemd[1]: Initializing machine ID from random generator. May 15 10:41:19.865949 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:41:19.865954 systemd[1]: Populated /etc with preset unit settings. May 15 10:41:19.865961 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:41:19.865968 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:41:19.865975 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:41:19.865983 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:41:19.865990 systemd[1]: Stopped iscsid.service. May 15 10:41:19.865996 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:41:19.866003 systemd[1]: Stopped initrd-switch-root.service. May 15 10:41:19.866009 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:41:19.866016 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:41:19.866022 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:41:19.866030 systemd[1]: Created slice system-getty.slice. May 15 10:41:19.866037 systemd[1]: Created slice system-modprobe.slice. May 15 10:41:19.866043 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:41:19.866050 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:41:19.866056 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:41:19.866062 systemd[1]: Created slice user.slice. May 15 10:41:19.866069 systemd[1]: Started systemd-ask-password-console.path. May 15 10:41:19.866075 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:41:19.866082 systemd[1]: Set up automount boot.automount. May 15 10:41:19.866090 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:41:19.866097 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:41:19.866104 systemd[1]: Stopped target initrd-fs.target. May 15 10:41:19.866111 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:41:19.866117 systemd[1]: Reached target integritysetup.target. May 15 10:41:19.866124 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:41:19.866131 systemd[1]: Reached target remote-fs.target. May 15 10:41:19.866137 systemd[1]: Reached target slices.target. May 15 10:41:19.866145 systemd[1]: Reached target swap.target. May 15 10:41:19.866152 systemd[1]: Reached target torcx.target. May 15 10:41:19.866159 systemd[1]: Reached target veritysetup.target. May 15 10:41:19.866165 systemd[1]: Listening on systemd-coredump.socket. May 15 10:41:19.866171 systemd[1]: Listening on systemd-initctl.socket. May 15 10:41:19.866179 systemd[1]: Listening on systemd-networkd.socket. May 15 10:41:19.866188 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:41:19.866205 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:41:19.866216 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:41:19.866223 systemd[1]: Mounting dev-hugepages.mount... May 15 10:41:19.866230 systemd[1]: Mounting dev-mqueue.mount... May 15 10:41:19.866236 systemd[1]: Mounting media.mount... May 15 10:41:19.866243 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:41:19.866252 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:41:19.866258 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:41:19.866265 systemd[1]: Mounting tmp.mount... May 15 10:41:19.866272 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:41:19.866278 systemd[1]: Starting ignition-delete-config.service... May 15 10:41:19.866285 systemd[1]: Starting kmod-static-nodes.service... May 15 10:41:19.866292 systemd[1]: Starting modprobe@configfs.service... May 15 10:41:19.866299 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:41:19.866305 systemd[1]: Starting modprobe@drm.service... May 15 10:41:19.866313 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:41:19.866320 systemd[1]: Starting modprobe@fuse.service... May 15 10:41:19.866336 systemd[1]: Starting modprobe@loop.service... May 15 10:41:19.866345 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:41:19.866352 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:41:19.866359 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:41:19.866366 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:41:19.866372 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:41:19.866379 systemd[1]: Stopped systemd-journald.service. May 15 10:41:19.866387 systemd[1]: Starting systemd-journald.service... May 15 10:41:19.866394 kernel: fuse: init (API version 7.34) May 15 10:41:19.866400 kernel: loop: module loaded May 15 10:41:19.866407 systemd[1]: Starting systemd-modules-load.service... May 15 10:41:19.866414 systemd[1]: Starting systemd-network-generator.service... May 15 10:41:19.866421 systemd[1]: Starting systemd-remount-fs.service... May 15 10:41:19.866427 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:41:19.866434 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:41:19.866442 systemd[1]: Stopped verity-setup.service. May 15 10:41:19.866449 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:41:19.866456 systemd[1]: Mounted dev-hugepages.mount. May 15 10:41:19.866462 systemd[1]: Mounted dev-mqueue.mount. May 15 10:41:19.866469 systemd[1]: Mounted media.mount. May 15 10:41:19.866476 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:41:19.866483 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:41:19.866489 systemd[1]: Mounted tmp.mount. May 15 10:41:19.866496 systemd[1]: Finished kmod-static-nodes.service. May 15 10:41:19.866504 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:41:19.866511 systemd[1]: Finished modprobe@configfs.service. May 15 10:41:19.866518 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:41:19.866525 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:41:19.866532 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:41:19.866539 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:41:19.866545 systemd[1]: Finished modprobe@drm.service. May 15 10:41:19.866552 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:41:19.866559 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:41:19.866567 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:41:19.866574 systemd[1]: Finished modprobe@fuse.service. May 15 10:41:19.866581 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:41:19.866587 systemd[1]: Finished modprobe@loop.service. May 15 10:41:19.866594 systemd[1]: Finished systemd-network-generator.service. May 15 10:41:19.866601 systemd[1]: Finished systemd-remount-fs.service. May 15 10:41:19.866608 systemd[1]: Reached target network-pre.target. May 15 10:41:19.866614 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:41:19.866624 systemd-journald[1011]: Journal started May 15 10:41:19.866654 systemd-journald[1011]: Runtime Journal (/run/log/journal/1e3d04bd599b492f88bb472bde90b36d) is 4.8M, max 38.8M, 34.0M free. May 15 10:41:17.886000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:41:17.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:41:17.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:41:17.925000 audit: BPF prog-id=10 op=LOAD May 15 10:41:17.925000 audit: BPF prog-id=10 op=UNLOAD May 15 10:41:17.925000 audit: BPF prog-id=11 op=LOAD May 15 10:41:17.925000 audit: BPF prog-id=11 op=UNLOAD May 15 10:41:18.016000 audit[919]: AVC avc: denied { associate } for pid=919 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:41:18.016000 audit[919]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d7040 a3=32 items=0 ppid=902 pid=919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:18.016000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:41:18.017000 audit[919]: AVC avc: denied { associate } for pid=919 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:41:18.017000 audit[919]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=902 pid=919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:18.017000 audit: CWD cwd="/" May 15 10:41:18.017000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:18.017000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:18.017000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:41:19.730000 audit: BPF prog-id=12 op=LOAD May 15 10:41:19.730000 audit: BPF prog-id=3 op=UNLOAD May 15 10:41:19.730000 audit: BPF prog-id=13 op=LOAD May 15 10:41:19.730000 audit: BPF prog-id=14 op=LOAD May 15 10:41:19.730000 audit: BPF prog-id=4 op=UNLOAD May 15 10:41:19.730000 audit: BPF prog-id=5 op=UNLOAD May 15 10:41:19.730000 audit: BPF prog-id=15 op=LOAD May 15 10:41:19.730000 audit: BPF prog-id=12 op=UNLOAD May 15 10:41:19.730000 audit: BPF prog-id=16 op=LOAD May 15 10:41:19.730000 audit: BPF prog-id=17 op=LOAD May 15 10:41:19.730000 audit: BPF prog-id=13 op=UNLOAD May 15 10:41:19.730000 audit: BPF prog-id=14 op=UNLOAD May 15 10:41:19.732000 audit: BPF prog-id=18 op=LOAD May 15 10:41:19.732000 audit: BPF prog-id=15 op=UNLOAD May 15 10:41:19.732000 audit: BPF prog-id=19 op=LOAD May 15 10:41:19.732000 audit: BPF prog-id=20 op=LOAD May 15 10:41:19.732000 audit: BPF prog-id=16 op=UNLOAD May 15 10:41:19.732000 audit: BPF prog-id=17 op=UNLOAD May 15 10:41:19.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.741000 audit: BPF prog-id=18 op=UNLOAD May 15 10:41:19.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.808000 audit: BPF prog-id=21 op=LOAD May 15 10:41:19.808000 audit: BPF prog-id=22 op=LOAD May 15 10:41:19.809000 audit: BPF prog-id=23 op=LOAD May 15 10:41:19.809000 audit: BPF prog-id=19 op=UNLOAD May 15 10:41:19.809000 audit: BPF prog-id=20 op=UNLOAD May 15 10:41:19.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.861000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:41:19.861000 audit[1011]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffdcfde65e0 a2=4000 a3=7ffdcfde667c items=0 ppid=1 pid=1011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:19.861000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:41:18.015849 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:41:19.730006 systemd[1]: Queued start job for default target multi-user.target. May 15 10:41:18.016360 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:41:19.730014 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 15 10:41:18.016372 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:41:19.734495 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:41:18.016393 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:41:18.016398 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:41:19.870022 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:41:19.870037 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:41:18.016418 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:41:18.016425 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:41:18.016543 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:41:18.016566 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:41:19.870238 jq[986]: true May 15 10:41:18.016574 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:41:18.016998 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:41:18.017018 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:41:18.017028 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:41:18.017037 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:41:18.017046 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:41:18.017053 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:41:19.511707 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:41:19.511861 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:41:19.511933 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:41:19.512049 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:41:19.512082 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:41:19.870923 jq[1029]: true May 15 10:41:19.512130 /usr/lib/systemd/system-generators/torcx-generator[919]: time="2025-05-15T10:41:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:41:19.887376 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:41:19.887406 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:41:19.888450 systemd[1]: Starting systemd-random-seed.service... May 15 10:41:19.892763 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:41:19.897403 systemd[1]: Starting systemd-sysusers.service... May 15 10:41:19.897441 systemd[1]: Started systemd-journald.service. May 15 10:41:19.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.895965 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:41:19.896112 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:41:19.897992 systemd[1]: Starting systemd-journal-flush.service... May 15 10:41:19.905730 systemd[1]: Finished systemd-modules-load.service. May 15 10:41:19.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.906755 systemd[1]: Starting systemd-sysctl.service... May 15 10:41:19.917895 systemd-journald[1011]: Time spent on flushing to /var/log/journal/1e3d04bd599b492f88bb472bde90b36d is 28.084ms for 2008 entries. May 15 10:41:19.917895 systemd-journald[1011]: System Journal (/var/log/journal/1e3d04bd599b492f88bb472bde90b36d) is 8.0M, max 584.8M, 576.8M free. May 15 10:41:20.027922 systemd-journald[1011]: Received client request to flush runtime journal. May 15 10:41:19.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:19.918295 systemd[1]: Finished systemd-random-seed.service. May 15 10:41:19.919037 systemd[1]: Reached target first-boot-complete.target. May 15 10:41:20.029120 udevadm[1045]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:41:19.967897 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:41:19.968869 systemd[1]: Starting systemd-udev-settle.service... May 15 10:41:19.989139 systemd[1]: Finished systemd-sysctl.service. May 15 10:41:20.028499 systemd[1]: Finished systemd-journal-flush.service. May 15 10:41:20.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.216437 systemd[1]: Finished systemd-sysusers.service. May 15 10:41:20.217404 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:41:20.535223 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:41:20.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.563753 ignition[1033]: Ignition 2.14.0 May 15 10:41:20.563949 ignition[1033]: deleting config from guestinfo properties May 15 10:41:20.567286 ignition[1033]: Successfully deleted config May 15 10:41:20.567884 systemd[1]: Finished ignition-delete-config.service. May 15 10:41:20.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.645781 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:41:20.645000 audit: BPF prog-id=24 op=LOAD May 15 10:41:20.645000 audit: BPF prog-id=25 op=LOAD May 15 10:41:20.645000 audit: BPF prog-id=7 op=UNLOAD May 15 10:41:20.645000 audit: BPF prog-id=8 op=UNLOAD May 15 10:41:20.646889 systemd[1]: Starting systemd-udevd.service... May 15 10:41:20.657999 systemd-udevd[1053]: Using default interface naming scheme 'v252'. May 15 10:41:20.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.676000 audit: BPF prog-id=26 op=LOAD May 15 10:41:20.676842 systemd[1]: Started systemd-udevd.service. May 15 10:41:20.678050 systemd[1]: Starting systemd-networkd.service... May 15 10:41:20.683000 audit: BPF prog-id=27 op=LOAD May 15 10:41:20.683000 audit: BPF prog-id=28 op=LOAD May 15 10:41:20.683000 audit: BPF prog-id=29 op=LOAD May 15 10:41:20.685136 systemd[1]: Starting systemd-userdbd.service... May 15 10:41:20.705735 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 10:41:20.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.714869 systemd[1]: Started systemd-userdbd.service. May 15 10:41:20.745365 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 10:41:20.758721 systemd-networkd[1061]: lo: Link UP May 15 10:41:20.758727 systemd-networkd[1061]: lo: Gained carrier May 15 10:41:20.759005 systemd-networkd[1061]: Enumeration completed May 15 10:41:20.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.759067 systemd-networkd[1061]: ens192: Configuring with /etc/systemd/network/00-vmware.network. May 15 10:41:20.759070 systemd[1]: Started systemd-networkd.service. May 15 10:41:20.761899 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 15 10:41:20.762044 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 15 10:41:20.762123 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready May 15 10:41:20.763579 kernel: ACPI: button: Power Button [PWRF] May 15 10:41:20.763326 systemd-networkd[1061]: ens192: Link UP May 15 10:41:20.763424 systemd-networkd[1061]: ens192: Gained carrier May 15 10:41:20.829000 audit[1057]: AVC avc: denied { confidentiality } for pid=1057 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 10:41:20.834343 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 May 15 10:41:20.846811 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc May 15 10:41:20.829000 audit[1057]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ed18d25820 a1=338ac a2=7fd0e2309bc5 a3=5 items=110 ppid=1053 pid=1057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:41:20.829000 audit: CWD cwd="/" May 15 10:41:20.829000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=1 name=(null) inode=24717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=2 name=(null) inode=24717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=3 name=(null) inode=24718 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=4 name=(null) inode=24717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=5 name=(null) inode=24719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=6 name=(null) inode=24717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=7 name=(null) inode=24720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=8 name=(null) inode=24720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=9 name=(null) inode=24721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=10 name=(null) inode=24720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=11 name=(null) inode=24722 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=12 name=(null) inode=24720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=13 name=(null) inode=24723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=14 name=(null) inode=24720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=15 name=(null) inode=24724 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=16 name=(null) inode=24720 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=17 name=(null) inode=24725 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=18 name=(null) inode=24717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=19 name=(null) inode=24726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=20 name=(null) inode=24726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=21 name=(null) inode=24727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=22 name=(null) inode=24726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=23 name=(null) inode=24728 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=24 name=(null) inode=24726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=25 name=(null) inode=24729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=26 name=(null) inode=24726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=27 name=(null) inode=24730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=28 name=(null) inode=24726 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=29 name=(null) inode=24731 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=30 name=(null) inode=24717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=31 name=(null) inode=24732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=32 name=(null) inode=24732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=33 name=(null) inode=24733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=34 name=(null) inode=24732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=35 name=(null) inode=24734 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=36 name=(null) inode=24732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=37 name=(null) inode=24735 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=38 name=(null) inode=24732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=39 name=(null) inode=24736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=40 name=(null) inode=24732 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=41 name=(null) inode=24737 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=42 name=(null) inode=24717 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=43 name=(null) inode=24738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=44 name=(null) inode=24738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=45 name=(null) inode=24739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=46 name=(null) inode=24738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=47 name=(null) inode=24740 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=48 name=(null) inode=24738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=49 name=(null) inode=24741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=50 name=(null) inode=24738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=51 name=(null) inode=24742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=52 name=(null) inode=24738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=53 name=(null) inode=24743 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=55 name=(null) inode=24744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=56 name=(null) inode=24744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=57 name=(null) inode=24745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=58 name=(null) inode=24744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=59 name=(null) inode=24746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=60 name=(null) inode=24744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=61 name=(null) inode=24747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=62 name=(null) inode=24747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=63 name=(null) inode=24748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=64 name=(null) inode=24747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=65 name=(null) inode=24749 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=66 name=(null) inode=24747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=67 name=(null) inode=24750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=68 name=(null) inode=24747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=69 name=(null) inode=24751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=70 name=(null) inode=24747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=71 name=(null) inode=24752 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=72 name=(null) inode=24744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=73 name=(null) inode=24753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=74 name=(null) inode=24753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=75 name=(null) inode=24754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=76 name=(null) inode=24753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=77 name=(null) inode=24755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=78 name=(null) inode=24753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=79 name=(null) inode=24756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=80 name=(null) inode=24753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=81 name=(null) inode=24757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=82 name=(null) inode=24753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=83 name=(null) inode=24758 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=84 name=(null) inode=24744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=85 name=(null) inode=24759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=86 name=(null) inode=24759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=87 name=(null) inode=24760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=88 name=(null) inode=24759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=89 name=(null) inode=24761 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=90 name=(null) inode=24759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=91 name=(null) inode=24762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=92 name=(null) inode=24759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=93 name=(null) inode=24763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=94 name=(null) inode=24759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=95 name=(null) inode=24764 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=96 name=(null) inode=24744 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=97 name=(null) inode=24765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=98 name=(null) inode=24765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=99 name=(null) inode=24766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=100 name=(null) inode=24765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=101 name=(null) inode=24767 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=102 name=(null) inode=24765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=103 name=(null) inode=24768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=104 name=(null) inode=24765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=105 name=(null) inode=24769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=106 name=(null) inode=24765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=107 name=(null) inode=24770 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PATH item=109 name=(null) inode=24771 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:41:20.829000 audit: PROCTITLE proctitle="(udev-worker)" May 15 10:41:20.858342 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! May 15 10:41:20.860729 kernel: Guest personality initialized and is active May 15 10:41:20.860758 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 May 15 10:41:20.860777 kernel: VMCI host device registered (name=vmci, major=10, minor=125) May 15 10:41:20.860798 kernel: Initialized host personality May 15 10:41:20.863623 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:41:20.876346 kernel: mousedev: PS/2 mouse device common for all mice May 15 10:41:20.898487 (udev-worker)[1063]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. May 15 10:41:20.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:20.910602 systemd[1]: Finished systemd-udev-settle.service. May 15 10:41:20.911579 systemd[1]: Starting lvm2-activation-early.service... May 15 10:41:21.054138 lvm[1086]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:41:21.090930 systemd[1]: Finished lvm2-activation-early.service. May 15 10:41:21.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.091122 systemd[1]: Reached target cryptsetup.target. May 15 10:41:21.092040 systemd[1]: Starting lvm2-activation.service... May 15 10:41:21.094189 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:41:21.116853 systemd[1]: Finished lvm2-activation.service. May 15 10:41:21.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.117033 systemd[1]: Reached target local-fs-pre.target. May 15 10:41:21.117134 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:41:21.117152 systemd[1]: Reached target local-fs.target. May 15 10:41:21.117241 systemd[1]: Reached target machines.target. May 15 10:41:21.118195 systemd[1]: Starting ldconfig.service... May 15 10:41:21.129079 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:41:21.129108 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:41:21.129909 systemd[1]: Starting systemd-boot-update.service... May 15 10:41:21.130597 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:41:21.131382 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:41:21.132134 systemd[1]: Starting systemd-sysext.service... May 15 10:41:21.145799 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1089 (bootctl) May 15 10:41:21.146490 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:41:21.172223 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:41:21.182108 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:41:21.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.189469 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:41:21.189582 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:41:21.215346 kernel: loop0: detected capacity change from 0 to 218376 May 15 10:41:21.901267 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:41:21.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.902048 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:41:21.920380 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:41:21.928181 systemd-fsck[1098]: fsck.fat 4.2 (2021-01-31) May 15 10:41:21.928181 systemd-fsck[1098]: /dev/sda1: 790 files, 120732/258078 clusters May 15 10:41:21.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.929479 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:41:21.930873 systemd[1]: Mounting boot.mount... May 15 10:41:21.940246 systemd[1]: Mounted boot.mount. May 15 10:41:21.942570 kernel: loop1: detected capacity change from 0 to 218376 May 15 10:41:21.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.951509 systemd[1]: Finished systemd-boot-update.service. May 15 10:41:21.965440 (sd-sysext)[1102]: Using extensions 'kubernetes'. May 15 10:41:21.965662 (sd-sysext)[1102]: Merged extensions into '/usr'. May 15 10:41:21.976896 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:41:21.978223 systemd[1]: Mounting usr-share-oem.mount... May 15 10:41:21.979267 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:41:21.981509 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:41:21.982523 systemd[1]: Starting modprobe@loop.service... May 15 10:41:21.983265 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:41:21.983380 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:41:21.983446 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:41:21.985190 systemd[1]: Mounted usr-share-oem.mount. May 15 10:41:21.985587 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:41:21.985698 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:41:21.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.986020 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:41:21.986116 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:41:21.986518 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:41:21.986583 systemd[1]: Finished modprobe@loop.service. May 15 10:41:21.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.987032 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:41:21.987144 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:41:21.987902 systemd[1]: Finished systemd-sysext.service. May 15 10:41:21.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:21.988824 systemd[1]: Starting ensure-sysext.service... May 15 10:41:21.989712 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:41:21.994774 systemd[1]: Reloading. May 15 10:41:22.002301 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:41:22.004751 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:41:22.013280 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:41:22.031166 /usr/lib/systemd/system-generators/torcx-generator[1128]: time="2025-05-15T10:41:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:41:22.031184 /usr/lib/systemd/system-generators/torcx-generator[1128]: time="2025-05-15T10:41:22Z" level=info msg="torcx already run" May 15 10:41:22.095550 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:41:22.095563 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:41:22.104495 systemd-networkd[1061]: ens192: Gained IPv6LL May 15 10:41:22.107530 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:41:22.151755 kernel: kauditd_printk_skb: 249 callbacks suppressed May 15 10:41:22.151812 kernel: audit: type=1334 audit(1747305682.141:172): prog-id=30 op=LOAD May 15 10:41:22.151839 kernel: audit: type=1334 audit(1747305682.142:173): prog-id=31 op=LOAD May 15 10:41:22.151854 kernel: audit: type=1334 audit(1747305682.142:174): prog-id=24 op=UNLOAD May 15 10:41:22.151868 kernel: audit: type=1334 audit(1747305682.142:175): prog-id=25 op=UNLOAD May 15 10:41:22.151881 kernel: audit: type=1334 audit(1747305682.143:176): prog-id=32 op=LOAD May 15 10:41:22.151893 kernel: audit: type=1334 audit(1747305682.143:177): prog-id=27 op=UNLOAD May 15 10:41:22.151905 kernel: audit: type=1334 audit(1747305682.144:178): prog-id=33 op=LOAD May 15 10:41:22.151922 kernel: audit: type=1334 audit(1747305682.145:179): prog-id=34 op=LOAD May 15 10:41:22.151937 kernel: audit: type=1334 audit(1747305682.145:180): prog-id=28 op=UNLOAD May 15 10:41:22.141000 audit: BPF prog-id=30 op=LOAD May 15 10:41:22.142000 audit: BPF prog-id=31 op=LOAD May 15 10:41:22.142000 audit: BPF prog-id=24 op=UNLOAD May 15 10:41:22.142000 audit: BPF prog-id=25 op=UNLOAD May 15 10:41:22.143000 audit: BPF prog-id=32 op=LOAD May 15 10:41:22.143000 audit: BPF prog-id=27 op=UNLOAD May 15 10:41:22.144000 audit: BPF prog-id=33 op=LOAD May 15 10:41:22.145000 audit: BPF prog-id=34 op=LOAD May 15 10:41:22.145000 audit: BPF prog-id=28 op=UNLOAD May 15 10:41:22.145000 audit: BPF prog-id=29 op=UNLOAD May 15 10:41:22.147000 audit: BPF prog-id=35 op=LOAD May 15 10:41:22.147000 audit: BPF prog-id=26 op=UNLOAD May 15 10:41:22.148000 audit: BPF prog-id=36 op=LOAD May 15 10:41:22.148000 audit: BPF prog-id=21 op=UNLOAD May 15 10:41:22.149000 audit: BPF prog-id=37 op=LOAD May 15 10:41:22.150000 audit: BPF prog-id=38 op=LOAD May 15 10:41:22.155344 kernel: audit: type=1334 audit(1747305682.145:181): prog-id=29 op=UNLOAD May 15 10:41:22.150000 audit: BPF prog-id=22 op=UNLOAD May 15 10:41:22.150000 audit: BPF prog-id=23 op=UNLOAD May 15 10:41:22.160361 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:41:22.161816 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:41:22.163402 systemd[1]: Starting modprobe@loop.service... May 15 10:41:22.163555 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:41:22.163637 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:41:22.164106 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:41:22.164189 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:41:22.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.164638 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:41:22.164771 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:41:22.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.165099 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:41:22.165170 systemd[1]: Finished modprobe@loop.service. May 15 10:41:22.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.165486 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:41:22.165773 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:41:22.167569 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:41:22.170041 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:41:22.172796 systemd[1]: Starting modprobe@loop.service... May 15 10:41:22.174249 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:41:22.174475 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:41:22.174958 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:41:22.175062 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:41:22.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.175413 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:41:22.175487 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:41:22.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.175760 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:41:22.176311 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:41:22.176476 systemd[1]: Finished modprobe@loop.service. May 15 10:41:22.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.179015 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:41:22.181469 systemd[1]: Starting modprobe@drm.service... May 15 10:41:22.182475 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:41:22.184275 systemd[1]: Starting modprobe@loop.service... May 15 10:41:22.184578 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:41:22.184652 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:41:22.185533 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:41:22.186417 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:41:22.186509 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:41:22.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.188450 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:41:22.188542 systemd[1]: Finished modprobe@drm.service. May 15 10:41:22.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.189968 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:41:22.190062 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:41:22.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.190377 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:41:22.190455 systemd[1]: Finished modprobe@loop.service. May 15 10:41:22.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.190840 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:41:22.190904 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:41:22.190967 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:41:22.191018 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:41:22.192255 systemd[1]: Finished ensure-sysext.service. May 15 10:41:22.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.218837 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:41:22.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.260703 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:41:22.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.261787 systemd[1]: Starting audit-rules.service... May 15 10:41:22.262652 systemd[1]: Starting clean-ca-certificates.service... May 15 10:41:22.263509 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:41:22.262000 audit: BPF prog-id=39 op=LOAD May 15 10:41:22.264000 audit: BPF prog-id=40 op=LOAD May 15 10:41:22.264721 systemd[1]: Starting systemd-resolved.service... May 15 10:41:22.265819 systemd[1]: Starting systemd-timesyncd.service... May 15 10:41:22.267789 systemd[1]: Starting systemd-update-utmp.service... May 15 10:41:22.285000 audit[1205]: SYSTEM_BOOT pid=1205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:41:22.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.287717 systemd[1]: Finished systemd-update-utmp.service. May 15 10:41:22.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.299073 systemd[1]: Finished clean-ca-certificates.service. May 15 10:41:22.299240 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:41:22.336665 systemd[1]: Started systemd-timesyncd.service. May 15 10:41:22.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:41:22.336860 systemd[1]: Reached target time-set.target. May 15 10:41:22.347204 systemd-resolved[1203]: Positive Trust Anchors: May 15 10:41:22.347425 systemd-resolved[1203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:41:22.347491 systemd-resolved[1203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:42:43.167510 systemd-timesyncd[1204]: Contacted time server 23.155.40.38:123 (0.flatcar.pool.ntp.org). May 15 10:42:43.167748 systemd-timesyncd[1204]: Initial clock synchronization to Thu 2025-05-15 10:42:43.167437 UTC. May 15 10:42:43.183768 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:42:43.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:43.197000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:42:43.197000 audit[1221]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd9dff480 a2=420 a3=0 items=0 ppid=1200 pid=1221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:42:43.197000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:42:43.198831 augenrules[1221]: No rules May 15 10:42:43.199365 systemd[1]: Finished audit-rules.service. May 15 10:42:43.254938 systemd-resolved[1203]: Defaulting to hostname 'linux'. May 15 10:42:43.256001 systemd[1]: Started systemd-resolved.service. May 15 10:42:43.256156 systemd[1]: Reached target network.target. May 15 10:42:43.256242 systemd[1]: Reached target network-online.target. May 15 10:42:43.256327 systemd[1]: Reached target nss-lookup.target. May 15 10:42:44.144736 ldconfig[1088]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:42:44.163872 systemd[1]: Finished ldconfig.service. May 15 10:42:44.165189 systemd[1]: Starting systemd-update-done.service... May 15 10:42:44.175180 systemd[1]: Finished systemd-update-done.service. May 15 10:42:44.175497 systemd[1]: Reached target sysinit.target. May 15 10:42:44.175832 systemd[1]: Started motdgen.path. May 15 10:42:44.176147 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:42:44.176465 systemd[1]: Started logrotate.timer. May 15 10:42:44.176750 systemd[1]: Started mdadm.timer. May 15 10:42:44.176932 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:42:44.177133 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:42:44.177224 systemd[1]: Reached target paths.target. May 15 10:42:44.177427 systemd[1]: Reached target timers.target. May 15 10:42:44.178269 systemd[1]: Listening on dbus.socket. May 15 10:42:44.179484 systemd[1]: Starting docker.socket... May 15 10:42:44.189548 systemd[1]: Listening on sshd.socket. May 15 10:42:44.189851 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:44.190278 systemd[1]: Listening on docker.socket. May 15 10:42:44.190522 systemd[1]: Reached target sockets.target. May 15 10:42:44.190704 systemd[1]: Reached target basic.target. May 15 10:42:44.190911 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:42:44.190998 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:42:44.191996 systemd[1]: Starting containerd.service... May 15 10:42:44.193184 systemd[1]: Starting dbus.service... May 15 10:42:44.194236 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:42:44.195297 systemd[1]: Starting extend-filesystems.service... May 15 10:42:44.195959 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:42:44.197008 jq[1231]: false May 15 10:42:44.202271 systemd[1]: Starting kubelet.service... May 15 10:42:44.203412 systemd[1]: Starting motdgen.service... May 15 10:42:44.211760 systemd[1]: Starting prepare-helm.service... May 15 10:42:44.212794 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:42:44.213839 systemd[1]: Starting sshd-keygen.service... May 15 10:42:44.215848 systemd[1]: Starting systemd-logind.service... May 15 10:42:44.216053 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:44.216110 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:42:44.216592 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:42:44.217074 systemd[1]: Starting update-engine.service... May 15 10:42:44.218421 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:42:44.220665 systemd[1]: Starting vmtoolsd.service... May 15 10:42:44.222225 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:42:44.222347 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:42:44.225675 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:42:44.225793 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:42:44.228178 jq[1242]: true May 15 10:42:44.234284 jq[1250]: true May 15 10:42:44.257579 systemd[1]: Started vmtoolsd.service. May 15 10:42:44.258290 extend-filesystems[1232]: Found loop1 May 15 10:42:44.258551 extend-filesystems[1232]: Found sda May 15 10:42:44.258551 extend-filesystems[1232]: Found sda1 May 15 10:42:44.258551 extend-filesystems[1232]: Found sda2 May 15 10:42:44.258551 extend-filesystems[1232]: Found sda3 May 15 10:42:44.258551 extend-filesystems[1232]: Found usr May 15 10:42:44.258551 extend-filesystems[1232]: Found sda4 May 15 10:42:44.258551 extend-filesystems[1232]: Found sda6 May 15 10:42:44.258551 extend-filesystems[1232]: Found sda7 May 15 10:42:44.258551 extend-filesystems[1232]: Found sda9 May 15 10:42:44.258551 extend-filesystems[1232]: Checking size of /dev/sda9 May 15 10:42:44.262766 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:42:44.262895 systemd[1]: Finished motdgen.service. May 15 10:42:44.299118 tar[1246]: linux-amd64/LICENSE May 15 10:42:44.299266 tar[1246]: linux-amd64/helm May 15 10:42:44.303921 extend-filesystems[1232]: Old size kept for /dev/sda9 May 15 10:42:44.303921 extend-filesystems[1232]: Found sr0 May 15 10:42:44.304192 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:42:44.304294 systemd[1]: Finished extend-filesystems.service. May 15 10:42:44.313416 systemd-logind[1240]: Watching system buttons on /dev/input/event1 (Power Button) May 15 10:42:44.313437 systemd-logind[1240]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 10:42:44.316176 systemd-logind[1240]: New seat seat0. May 15 10:42:44.333886 env[1269]: time="2025-05-15T10:42:44.333860244Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:42:44.347774 bash[1268]: Updated "/home/core/.ssh/authorized_keys" May 15 10:42:44.348358 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:42:44.358595 kernel: NET: Registered PF_VSOCK protocol family May 15 10:42:44.357064 systemd[1]: Started dbus.service. May 15 10:42:44.356752 dbus-daemon[1230]: [system] SELinux support is enabled May 15 10:42:44.358303 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:42:44.358317 systemd[1]: Reached target system-config.target. May 15 10:42:44.358427 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:42:44.358437 systemd[1]: Reached target user-config.target. May 15 10:42:44.361077 systemd[1]: Started systemd-logind.service. May 15 10:42:44.361238 dbus-daemon[1230]: [system] Successfully activated service 'org.freedesktop.systemd1' May 15 10:42:44.421471 update_engine[1241]: I0515 10:42:44.420297 1241 main.cc:92] Flatcar Update Engine starting May 15 10:42:44.422740 systemd[1]: Started update-engine.service. May 15 10:42:44.425216 update_engine[1241]: I0515 10:42:44.422766 1241 update_check_scheduler.cc:74] Next update check in 2m16s May 15 10:42:44.424569 systemd[1]: Started locksmithd.service. May 15 10:42:44.429114 env[1269]: time="2025-05-15T10:42:44.428985314Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:42:44.429174 env[1269]: time="2025-05-15T10:42:44.429135163Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.429868235Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.429897746Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.430015976Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.430039493Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.430048619Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.430054763Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.430097564Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.430221545Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.430285226Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:42:44.430620 env[1269]: time="2025-05-15T10:42:44.430295084Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:42:44.430794 env[1269]: time="2025-05-15T10:42:44.430324926Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:42:44.430794 env[1269]: time="2025-05-15T10:42:44.430332696Z" level=info msg="metadata content store policy set" policy=shared May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442109720Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442140019Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442150221Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442182598Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442194298Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442202471Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442209306Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442217184Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442224810Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442233056Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442240015Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442262 env[1269]: time="2025-05-15T10:42:44.442247033Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:42:44.442514 env[1269]: time="2025-05-15T10:42:44.442337519Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:42:44.442514 env[1269]: time="2025-05-15T10:42:44.442398414Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:42:44.442590 env[1269]: time="2025-05-15T10:42:44.442575646Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:42:44.442617 env[1269]: time="2025-05-15T10:42:44.442596396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442617 env[1269]: time="2025-05-15T10:42:44.442604492Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:42:44.442666 env[1269]: time="2025-05-15T10:42:44.442649112Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442691 env[1269]: time="2025-05-15T10:42:44.442665877Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442691 env[1269]: time="2025-05-15T10:42:44.442678400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442729 env[1269]: time="2025-05-15T10:42:44.442689720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442729 env[1269]: time="2025-05-15T10:42:44.442700509Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442729 env[1269]: time="2025-05-15T10:42:44.442710180Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442729 env[1269]: time="2025-05-15T10:42:44.442721784Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442808 env[1269]: time="2025-05-15T10:42:44.442731178Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442808 env[1269]: time="2025-05-15T10:42:44.442745022Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:42:44.442845 env[1269]: time="2025-05-15T10:42:44.442819579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442845 env[1269]: time="2025-05-15T10:42:44.442829111Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442845 env[1269]: time="2025-05-15T10:42:44.442835981Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:42:44.442845 env[1269]: time="2025-05-15T10:42:44.442842126Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:42:44.442903 env[1269]: time="2025-05-15T10:42:44.442850193Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:42:44.442903 env[1269]: time="2025-05-15T10:42:44.442856575Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:42:44.442903 env[1269]: time="2025-05-15T10:42:44.442872579Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:42:44.442903 env[1269]: time="2025-05-15T10:42:44.442895528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:42:44.443079 env[1269]: time="2025-05-15T10:42:44.443016374Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:42:44.443079 env[1269]: time="2025-05-15T10:42:44.443070093Z" level=info msg="Connect containerd service" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.443092076Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.443400741Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.443548595Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.443571784Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.443599206Z" level=info msg="containerd successfully booted in 0.110130s" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.444623120Z" level=info msg="Start subscribing containerd event" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.444658028Z" level=info msg="Start recovering state" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.444716254Z" level=info msg="Start event monitor" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.444733813Z" level=info msg="Start snapshots syncer" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.444747310Z" level=info msg="Start cni network conf syncer for default" May 15 10:42:44.445774 env[1269]: time="2025-05-15T10:42:44.444757143Z" level=info msg="Start streaming server" May 15 10:42:44.443648 systemd[1]: Started containerd.service. May 15 10:42:44.738374 tar[1246]: linux-amd64/README.md May 15 10:42:44.741438 systemd[1]: Finished prepare-helm.service. May 15 10:42:44.837403 locksmithd[1296]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:42:44.965576 sshd_keygen[1254]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:42:44.979519 systemd[1]: Finished sshd-keygen.service. May 15 10:42:44.980674 systemd[1]: Starting issuegen.service... May 15 10:42:44.984204 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:42:44.984297 systemd[1]: Finished issuegen.service. May 15 10:42:44.985351 systemd[1]: Starting systemd-user-sessions.service... May 15 10:42:44.989490 systemd[1]: Finished systemd-user-sessions.service. May 15 10:42:44.990359 systemd[1]: Started getty@tty1.service. May 15 10:42:44.991126 systemd[1]: Started serial-getty@ttyS0.service. May 15 10:42:44.991501 systemd[1]: Reached target getty.target. May 15 10:42:45.498218 systemd[1]: Started kubelet.service. May 15 10:42:45.498566 systemd[1]: Reached target multi-user.target. May 15 10:42:45.499649 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:42:45.504474 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:42:45.504568 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:42:45.504752 systemd[1]: Startup finished in 877ms (kernel) + 5.209s (initrd) + 7.022s (userspace) = 13.109s. May 15 10:42:45.526212 login[1358]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 15 10:42:45.527928 login[1359]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 15 10:42:45.536352 systemd[1]: Created slice user-500.slice. May 15 10:42:45.537219 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:42:45.542098 systemd-logind[1240]: New session 1 of user core. May 15 10:42:45.544847 systemd-logind[1240]: New session 2 of user core. May 15 10:42:45.547430 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:42:45.548542 systemd[1]: Starting user@500.service... May 15 10:42:45.551287 (systemd)[1365]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:42:45.607680 systemd[1365]: Queued start job for default target default.target. May 15 10:42:45.608285 systemd[1365]: Reached target paths.target. May 15 10:42:45.608305 systemd[1365]: Reached target sockets.target. May 15 10:42:45.608314 systemd[1365]: Reached target timers.target. May 15 10:42:45.608321 systemd[1365]: Reached target basic.target. May 15 10:42:45.608382 systemd[1]: Started user@500.service. May 15 10:42:45.609145 systemd[1]: Started session-1.scope. May 15 10:42:45.609633 systemd[1]: Started session-2.scope. May 15 10:42:45.610284 systemd[1365]: Reached target default.target. May 15 10:42:45.610367 systemd[1365]: Startup finished in 54ms. May 15 10:42:46.508580 kubelet[1362]: E0515 10:42:46.508544 1362 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:42:46.509688 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:42:46.509767 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:42:56.760314 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:42:56.760444 systemd[1]: Stopped kubelet.service. May 15 10:42:56.761458 systemd[1]: Starting kubelet.service... May 15 10:42:57.086315 systemd[1]: Started kubelet.service. May 15 10:42:57.149256 kubelet[1394]: E0515 10:42:57.149225 1394 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:42:57.151812 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:42:57.151909 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:43:07.402452 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:43:07.402582 systemd[1]: Stopped kubelet.service. May 15 10:43:07.403568 systemd[1]: Starting kubelet.service... May 15 10:43:07.546341 systemd[1]: Started kubelet.service. May 15 10:43:07.578679 kubelet[1403]: E0515 10:43:07.578655 1403 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:43:07.579769 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:43:07.579841 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:43:14.498999 systemd[1]: Created slice system-sshd.slice. May 15 10:43:14.500248 systemd[1]: Started sshd@0-139.178.70.100:22-147.75.109.163:58660.service. May 15 10:43:14.577795 sshd[1409]: Accepted publickey for core from 147.75.109.163 port 58660 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:43:14.578654 sshd[1409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:43:14.581535 systemd-logind[1240]: New session 3 of user core. May 15 10:43:14.582127 systemd[1]: Started session-3.scope. May 15 10:43:14.630638 systemd[1]: Started sshd@1-139.178.70.100:22-147.75.109.163:58664.service. May 15 10:43:14.671207 sshd[1414]: Accepted publickey for core from 147.75.109.163 port 58664 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:43:14.672119 sshd[1414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:43:14.675047 systemd-logind[1240]: New session 4 of user core. May 15 10:43:14.675497 systemd[1]: Started session-4.scope. May 15 10:43:14.727842 sshd[1414]: pam_unix(sshd:session): session closed for user core May 15 10:43:14.728247 systemd[1]: Started sshd@2-139.178.70.100:22-147.75.109.163:58672.service. May 15 10:43:14.729849 systemd[1]: sshd@1-139.178.70.100:22-147.75.109.163:58664.service: Deactivated successfully. May 15 10:43:14.730328 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:43:14.732141 systemd-logind[1240]: Session 4 logged out. Waiting for processes to exit. May 15 10:43:14.732734 systemd-logind[1240]: Removed session 4. May 15 10:43:14.767765 sshd[1419]: Accepted publickey for core from 147.75.109.163 port 58672 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:43:14.769184 sshd[1419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:43:14.772726 systemd[1]: Started session-5.scope. May 15 10:43:14.773050 systemd-logind[1240]: New session 5 of user core. May 15 10:43:14.821513 sshd[1419]: pam_unix(sshd:session): session closed for user core May 15 10:43:14.824210 systemd[1]: sshd@2-139.178.70.100:22-147.75.109.163:58672.service: Deactivated successfully. May 15 10:43:14.824659 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:43:14.825953 systemd[1]: Started sshd@3-139.178.70.100:22-147.75.109.163:58678.service. May 15 10:43:14.826505 systemd-logind[1240]: Session 5 logged out. Waiting for processes to exit. May 15 10:43:14.827252 systemd-logind[1240]: Removed session 5. May 15 10:43:14.866836 sshd[1426]: Accepted publickey for core from 147.75.109.163 port 58678 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:43:14.868113 sshd[1426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:43:14.871504 systemd[1]: Started session-6.scope. May 15 10:43:14.871804 systemd-logind[1240]: New session 6 of user core. May 15 10:43:14.922025 sshd[1426]: pam_unix(sshd:session): session closed for user core May 15 10:43:14.924941 systemd[1]: Started sshd@4-139.178.70.100:22-147.75.109.163:58690.service. May 15 10:43:14.925371 systemd[1]: sshd@3-139.178.70.100:22-147.75.109.163:58678.service: Deactivated successfully. May 15 10:43:14.925838 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:43:14.926304 systemd-logind[1240]: Session 6 logged out. Waiting for processes to exit. May 15 10:43:14.927315 systemd-logind[1240]: Removed session 6. May 15 10:43:14.965088 sshd[1431]: Accepted publickey for core from 147.75.109.163 port 58690 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:43:14.966232 sshd[1431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:43:14.969645 systemd-logind[1240]: New session 7 of user core. May 15 10:43:14.970268 systemd[1]: Started session-7.scope. May 15 10:43:15.176420 sudo[1435]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:43:15.177321 sudo[1435]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:43:15.189178 dbus-daemon[1230]: \xd0\u001d\xc3E\xe8U: received setenforce notice (enforcing=1225890496) May 15 10:43:15.190179 sudo[1435]: pam_unix(sudo:session): session closed for user root May 15 10:43:15.199090 sshd[1431]: pam_unix(sshd:session): session closed for user core May 15 10:43:15.200637 systemd[1]: Started sshd@5-139.178.70.100:22-147.75.109.163:58706.service. May 15 10:43:15.202822 systemd[1]: sshd@4-139.178.70.100:22-147.75.109.163:58690.service: Deactivated successfully. May 15 10:43:15.203396 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:43:15.204350 systemd-logind[1240]: Session 7 logged out. Waiting for processes to exit. May 15 10:43:15.205216 systemd-logind[1240]: Removed session 7. May 15 10:43:15.239952 sshd[1438]: Accepted publickey for core from 147.75.109.163 port 58706 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:43:15.240916 sshd[1438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:43:15.244183 systemd[1]: Started session-8.scope. May 15 10:43:15.244380 systemd-logind[1240]: New session 8 of user core. May 15 10:43:15.294995 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:43:15.295189 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:43:15.297234 sudo[1443]: pam_unix(sudo:session): session closed for user root May 15 10:43:15.300702 sudo[1442]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:43:15.300854 sudo[1442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:43:15.308166 systemd[1]: Stopping audit-rules.service... May 15 10:43:15.308000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:43:15.310240 auditctl[1446]: No rules May 15 10:43:15.313519 kernel: kauditd_printk_skb: 41 callbacks suppressed May 15 10:43:15.313610 kernel: audit: type=1305 audit(1747305795.308:221): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:43:15.308000 audit[1446]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd799c7b00 a2=420 a3=0 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.313888 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:43:15.314052 systemd[1]: Stopped audit-rules.service. May 15 10:43:15.315422 systemd[1]: Starting audit-rules.service... May 15 10:43:15.318880 kernel: audit: type=1300 audit(1747305795.308:221): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd799c7b00 a2=420 a3=0 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.308000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:43:15.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:15.323251 kernel: audit: type=1327 audit(1747305795.308:221): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:43:15.323301 kernel: audit: type=1131 audit(1747305795.313:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:15.328753 augenrules[1463]: No rules May 15 10:43:15.329369 systemd[1]: Finished audit-rules.service. May 15 10:43:15.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:15.329934 sudo[1442]: pam_unix(sudo:session): session closed for user root May 15 10:43:15.333857 systemd[1]: Started sshd@6-139.178.70.100:22-147.75.109.163:58712.service. May 15 10:43:15.334287 kernel: audit: type=1130 audit(1747305795.328:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:15.334193 sshd[1438]: pam_unix(sshd:session): session closed for user core May 15 10:43:15.328000 audit[1442]: USER_END pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:15.338730 kernel: audit: type=1106 audit(1747305795.328:224): pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:15.338826 systemd[1]: sshd@5-139.178.70.100:22-147.75.109.163:58706.service: Deactivated successfully. May 15 10:43:15.329000 audit[1442]: CRED_DISP pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:15.339322 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:43:15.342159 kernel: audit: type=1104 audit(1747305795.329:225): pid=1442 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:15.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:58712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:15.337000 audit[1438]: USER_END pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:15.345697 systemd-logind[1240]: Session 8 logged out. Waiting for processes to exit. May 15 10:43:15.349409 kernel: audit: type=1130 audit(1747305795.332:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:58712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:15.349448 kernel: audit: type=1106 audit(1747305795.337:227): pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:15.337000 audit[1438]: CRED_DISP pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:15.352496 kernel: audit: type=1104 audit(1747305795.337:228): pid=1438 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:15.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.100:22-147.75.109.163:58706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:15.352814 systemd-logind[1240]: Removed session 8. May 15 10:43:15.370000 audit[1468]: USER_ACCT pid=1468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:15.372113 sshd[1468]: Accepted publickey for core from 147.75.109.163 port 58712 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:43:15.371000 audit[1468]: CRED_ACQ pid=1468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:15.371000 audit[1468]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd0357ed0 a2=3 a3=0 items=0 ppid=1 pid=1468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.371000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:43:15.373292 sshd[1468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:43:15.376757 systemd[1]: Started session-9.scope. May 15 10:43:15.377068 systemd-logind[1240]: New session 9 of user core. May 15 10:43:15.378000 audit[1468]: USER_START pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:15.379000 audit[1471]: CRED_ACQ pid=1471 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:15.429153 sudo[1472]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:43:15.428000 audit[1472]: USER_ACCT pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:15.428000 audit[1472]: CRED_REFR pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:15.430244 sudo[1472]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:43:15.430000 audit[1472]: USER_START pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:15.449334 systemd[1]: Starting docker.service... May 15 10:43:15.487934 env[1483]: time="2025-05-15T10:43:15.487905745Z" level=info msg="Starting up" May 15 10:43:15.488976 env[1483]: time="2025-05-15T10:43:15.488952883Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:43:15.488976 env[1483]: time="2025-05-15T10:43:15.488972109Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:43:15.489064 env[1483]: time="2025-05-15T10:43:15.488991077Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:43:15.489064 env[1483]: time="2025-05-15T10:43:15.489001069Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:43:15.490675 env[1483]: time="2025-05-15T10:43:15.490587413Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:43:15.490675 env[1483]: time="2025-05-15T10:43:15.490608727Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:43:15.490675 env[1483]: time="2025-05-15T10:43:15.490630181Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:43:15.490675 env[1483]: time="2025-05-15T10:43:15.490639840Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:43:15.514955 env[1483]: time="2025-05-15T10:43:15.514921446Z" level=info msg="Loading containers: start." May 15 10:43:15.588000 audit[1513]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1513 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.588000 audit[1513]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcdc67dcc0 a2=0 a3=7ffcdc67dcac items=0 ppid=1483 pid=1513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:43:15.590000 audit[1515]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1515 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.590000 audit[1515]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffbb5a1a40 a2=0 a3=7fffbb5a1a2c items=0 ppid=1483 pid=1515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.590000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:43:15.592000 audit[1517]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1517 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.592000 audit[1517]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd6e242a70 a2=0 a3=7ffd6e242a5c items=0 ppid=1483 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.592000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:43:15.593000 audit[1519]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1519 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.593000 audit[1519]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcfcbd4920 a2=0 a3=7ffcfcbd490c items=0 ppid=1483 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:43:15.595000 audit[1521]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1521 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.595000 audit[1521]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec752bce0 a2=0 a3=7ffec752bccc items=0 ppid=1483 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.595000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:43:15.611000 audit[1526]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.611000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea90044f0 a2=0 a3=7ffea90044dc items=0 ppid=1483 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.611000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:43:15.614000 audit[1528]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.614000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff583243f0 a2=0 a3=7fff583243dc items=0 ppid=1483 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.614000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:43:15.616000 audit[1530]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.616000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff042d2020 a2=0 a3=7fff042d200c items=0 ppid=1483 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.616000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:43:15.617000 audit[1532]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.617000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe34f95f70 a2=0 a3=7ffe34f95f5c items=0 ppid=1483 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.617000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:43:15.623000 audit[1536]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1536 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.623000 audit[1536]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd477bb880 a2=0 a3=7ffd477bb86c items=0 ppid=1483 pid=1536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.623000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:43:15.627000 audit[1537]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.627000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc4a12bd50 a2=0 a3=7ffc4a12bd3c items=0 ppid=1483 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.627000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:43:15.638054 kernel: Initializing XFRM netlink socket May 15 10:43:15.696745 env[1483]: time="2025-05-15T10:43:15.695858582Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:43:15.715000 audit[1545]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.715000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe99890260 a2=0 a3=7ffe9989024c items=0 ppid=1483 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.715000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:43:15.724000 audit[1548]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.724000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff00437740 a2=0 a3=7fff0043772c items=0 ppid=1483 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:43:15.726000 audit[1551]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.726000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd8137fd60 a2=0 a3=7ffd8137fd4c items=0 ppid=1483 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.726000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:43:15.727000 audit[1553]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.727000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc772a87f0 a2=0 a3=7ffc772a87dc items=0 ppid=1483 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:43:15.728000 audit[1555]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.728000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe0ff68f60 a2=0 a3=7ffe0ff68f4c items=0 ppid=1483 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:43:15.730000 audit[1557]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.730000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd89351350 a2=0 a3=7ffd8935133c items=0 ppid=1483 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.730000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:43:15.731000 audit[1559]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.731000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdbc352970 a2=0 a3=7ffdbc35295c items=0 ppid=1483 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.731000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:43:15.754000 audit[1562]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.754000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff4b4214b0 a2=0 a3=7fff4b42149c items=0 ppid=1483 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.754000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:43:15.755000 audit[1564]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.755000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcc5f17430 a2=0 a3=7ffcc5f1741c items=0 ppid=1483 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:43:15.756000 audit[1566]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.756000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcbc14c580 a2=0 a3=7ffcbc14c56c items=0 ppid=1483 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:43:15.758000 audit[1568]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.758000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe64cf1ac0 a2=0 a3=7ffe64cf1aac items=0 ppid=1483 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:43:15.759792 systemd-networkd[1061]: docker0: Link UP May 15 10:43:15.768000 audit[1572]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.768000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee3502d60 a2=0 a3=7ffee3502d4c items=0 ppid=1483 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:43:15.773000 audit[1573]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:15.773000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc588c32b0 a2=0 a3=7ffc588c329c items=0 ppid=1483 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:15.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:43:15.775332 env[1483]: time="2025-05-15T10:43:15.775306236Z" level=info msg="Loading containers: done." May 15 10:43:15.783943 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3872825177-merged.mount: Deactivated successfully. May 15 10:43:15.789278 env[1483]: time="2025-05-15T10:43:15.789242256Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:43:15.789575 env[1483]: time="2025-05-15T10:43:15.789557936Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:43:15.789717 env[1483]: time="2025-05-15T10:43:15.789707013Z" level=info msg="Daemon has completed initialization" May 15 10:43:15.797682 systemd[1]: Started docker.service. May 15 10:43:15.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:15.804910 env[1483]: time="2025-05-15T10:43:15.804852787Z" level=info msg="API listen on /run/docker.sock" May 15 10:43:16.919936 env[1269]: time="2025-05-15T10:43:16.919900203Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 15 10:43:17.594189 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 15 10:43:17.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:17.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:17.594285 systemd[1]: Stopped kubelet.service. May 15 10:43:17.595366 systemd[1]: Starting kubelet.service... May 15 10:43:17.603524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3241380136.mount: Deactivated successfully. May 15 10:43:17.669917 systemd[1]: Started kubelet.service. May 15 10:43:17.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:17.691756 kubelet[1609]: E0515 10:43:17.691732 1609 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:43:17.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:43:17.692762 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:43:17.692831 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:43:19.425202 env[1269]: time="2025-05-15T10:43:19.425173350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:19.427531 env[1269]: time="2025-05-15T10:43:19.427515138Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:19.430017 env[1269]: time="2025-05-15T10:43:19.429997544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:19.431011 env[1269]: time="2025-05-15T10:43:19.430996395Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:19.431485 env[1269]: time="2025-05-15T10:43:19.431470090Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 15 10:43:19.432062 env[1269]: time="2025-05-15T10:43:19.432045496Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 15 10:43:20.987345 env[1269]: time="2025-05-15T10:43:20.987308291Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:21.007819 env[1269]: time="2025-05-15T10:43:21.007791113Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:21.036686 env[1269]: time="2025-05-15T10:43:21.036633935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:21.048292 env[1269]: time="2025-05-15T10:43:21.048251168Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:21.049175 env[1269]: time="2025-05-15T10:43:21.049150124Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 15 10:43:21.050280 env[1269]: time="2025-05-15T10:43:21.050268211Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 15 10:43:22.298992 env[1269]: time="2025-05-15T10:43:22.298955604Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:22.300427 env[1269]: time="2025-05-15T10:43:22.300404222Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:22.302052 env[1269]: time="2025-05-15T10:43:22.302012009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:22.303691 env[1269]: time="2025-05-15T10:43:22.303571260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:22.304661 env[1269]: time="2025-05-15T10:43:22.304134672Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 15 10:43:22.305096 env[1269]: time="2025-05-15T10:43:22.305078936Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 15 10:43:23.326222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount439911616.mount: Deactivated successfully. May 15 10:43:23.910424 env[1269]: time="2025-05-15T10:43:23.910391891Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:23.925765 env[1269]: time="2025-05-15T10:43:23.925738256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:23.928245 env[1269]: time="2025-05-15T10:43:23.928229671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:23.928841 env[1269]: time="2025-05-15T10:43:23.928829296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:23.929168 env[1269]: time="2025-05-15T10:43:23.929153061Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 15 10:43:23.929559 env[1269]: time="2025-05-15T10:43:23.929543896Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 15 10:43:24.567745 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount506025055.mount: Deactivated successfully. May 15 10:43:25.624706 env[1269]: time="2025-05-15T10:43:25.624665390Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:25.637721 env[1269]: time="2025-05-15T10:43:25.637693766Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:25.650024 env[1269]: time="2025-05-15T10:43:25.649978244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:25.652433 env[1269]: time="2025-05-15T10:43:25.652402358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:25.652921 env[1269]: time="2025-05-15T10:43:25.652903460Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 15 10:43:25.653901 env[1269]: time="2025-05-15T10:43:25.653889050Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 10:43:26.175256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3268953372.mount: Deactivated successfully. May 15 10:43:26.177768 env[1269]: time="2025-05-15T10:43:26.177743850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:26.178984 env[1269]: time="2025-05-15T10:43:26.178964018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:26.182083 env[1269]: time="2025-05-15T10:43:26.182060304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:26.183201 env[1269]: time="2025-05-15T10:43:26.183181956Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:26.183540 env[1269]: time="2025-05-15T10:43:26.183524048Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 15 10:43:26.184509 env[1269]: time="2025-05-15T10:43:26.184483437Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 15 10:43:26.716330 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3017858616.mount: Deactivated successfully. May 15 10:43:27.869296 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 15 10:43:27.869431 systemd[1]: Stopped kubelet.service. May 15 10:43:27.870524 systemd[1]: Starting kubelet.service... May 15 10:43:27.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:27.871968 kernel: kauditd_printk_skb: 88 callbacks suppressed May 15 10:43:27.872051 kernel: audit: type=1130 audit(1747305807.868:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:27.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:27.877374 kernel: audit: type=1131 audit(1747305807.868:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:28.769325 systemd[1]: Started kubelet.service. May 15 10:43:28.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:28.773043 kernel: audit: type=1130 audit(1747305808.768:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:28.809917 kubelet[1621]: E0515 10:43:28.809880 1621 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:43:28.810926 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:43:28.811004 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:43:28.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:43:28.814052 kernel: audit: type=1131 audit(1747305808.810:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:43:29.232536 env[1269]: time="2025-05-15T10:43:29.232477323Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:29.251992 env[1269]: time="2025-05-15T10:43:29.251947682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:29.262566 env[1269]: time="2025-05-15T10:43:29.262520834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:29.273846 env[1269]: time="2025-05-15T10:43:29.273797410Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:29.274575 env[1269]: time="2025-05-15T10:43:29.274548537Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 15 10:43:29.409854 update_engine[1241]: I0515 10:43:29.409808 1241 update_attempter.cc:509] Updating boot flags... May 15 10:43:31.016752 systemd[1]: Stopped kubelet.service. May 15 10:43:31.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:31.019791 systemd[1]: Starting kubelet.service... May 15 10:43:31.020088 kernel: audit: type=1130 audit(1747305811.015:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:31.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:31.024041 kernel: audit: type=1131 audit(1747305811.015:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:31.040493 systemd[1]: Reloading. May 15 10:43:31.086835 /usr/lib/systemd/system-generators/torcx-generator[1688]: time="2025-05-15T10:43:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:43:31.086855 /usr/lib/systemd/system-generators/torcx-generator[1688]: time="2025-05-15T10:43:31Z" level=info msg="torcx already run" May 15 10:43:31.147583 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:43:31.147594 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:43:31.160837 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:43:31.226706 kernel: audit: type=1400 audit(1747305811.218:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226775 kernel: audit: type=1400 audit(1747305811.218:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226800 kernel: audit: type=1400 audit(1747305811.218:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230035 kernel: audit: type=1400 audit(1747305811.218:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit: BPF prog-id=46 op=LOAD May 15 10:43:31.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.225000 audit: BPF prog-id=47 op=LOAD May 15 10:43:31.225000 audit: BPF prog-id=30 op=UNLOAD May 15 10:43:31.225000 audit: BPF prog-id=31 op=UNLOAD May 15 10:43:31.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit: BPF prog-id=48 op=LOAD May 15 10:43:31.228000 audit: BPF prog-id=41 op=UNLOAD May 15 10:43:31.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit: BPF prog-id=49 op=LOAD May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit: BPF prog-id=50 op=LOAD May 15 10:43:31.229000 audit: BPF prog-id=42 op=UNLOAD May 15 10:43:31.229000 audit: BPF prog-id=43 op=UNLOAD May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit: BPF prog-id=51 op=LOAD May 15 10:43:31.229000 audit: BPF prog-id=32 op=UNLOAD May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit: BPF prog-id=52 op=LOAD May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.229000 audit: BPF prog-id=53 op=LOAD May 15 10:43:31.229000 audit: BPF prog-id=33 op=UNLOAD May 15 10:43:31.229000 audit: BPF prog-id=34 op=UNLOAD May 15 10:43:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.230000 audit: BPF prog-id=54 op=LOAD May 15 10:43:31.230000 audit: BPF prog-id=39 op=UNLOAD May 15 10:43:31.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.231000 audit: BPF prog-id=55 op=LOAD May 15 10:43:31.231000 audit: BPF prog-id=44 op=UNLOAD May 15 10:43:31.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit: BPF prog-id=56 op=LOAD May 15 10:43:31.233000 audit: BPF prog-id=40 op=UNLOAD May 15 10:43:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.233000 audit: BPF prog-id=57 op=LOAD May 15 10:43:31.233000 audit: BPF prog-id=35 op=UNLOAD May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit: BPF prog-id=58 op=LOAD May 15 10:43:31.234000 audit: BPF prog-id=36 op=UNLOAD May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit: BPF prog-id=59 op=LOAD May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:31.235000 audit: BPF prog-id=60 op=LOAD May 15 10:43:31.235000 audit: BPF prog-id=37 op=UNLOAD May 15 10:43:31.235000 audit: BPF prog-id=38 op=UNLOAD May 15 10:43:31.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:43:31.250494 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 15 10:43:31.250534 systemd[1]: kubelet.service: Failed with result 'signal'. May 15 10:43:31.250653 systemd[1]: Stopped kubelet.service. May 15 10:43:31.251831 systemd[1]: Starting kubelet.service... May 15 10:43:31.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:31.588438 systemd[1]: Started kubelet.service. May 15 10:43:31.694460 kubelet[1752]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:43:31.694679 kubelet[1752]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 10:43:31.694728 kubelet[1752]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:43:31.694849 kubelet[1752]: I0515 10:43:31.694831 1752 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:43:32.110439 kubelet[1752]: I0515 10:43:32.110413 1752 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 10:43:32.110439 kubelet[1752]: I0515 10:43:32.110433 1752 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:43:32.110605 kubelet[1752]: I0515 10:43:32.110593 1752 server.go:954] "Client rotation is on, will bootstrap in background" May 15 10:43:32.136458 kubelet[1752]: E0515 10:43:32.136436 1752 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.100:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:32.138348 kubelet[1752]: I0515 10:43:32.138336 1752 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:43:32.164420 kubelet[1752]: E0515 10:43:32.164391 1752 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:43:32.164420 kubelet[1752]: I0515 10:43:32.164413 1752 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:43:32.166205 kubelet[1752]: I0515 10:43:32.166194 1752 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:43:32.207341 kubelet[1752]: I0515 10:43:32.207277 1752 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:43:32.207466 kubelet[1752]: I0515 10:43:32.207332 1752 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:43:32.207466 kubelet[1752]: I0515 10:43:32.207460 1752 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:43:32.207466 kubelet[1752]: I0515 10:43:32.207466 1752 container_manager_linux.go:304] "Creating device plugin manager" May 15 10:43:32.207596 kubelet[1752]: I0515 10:43:32.207539 1752 state_mem.go:36] "Initialized new in-memory state store" May 15 10:43:32.263418 kubelet[1752]: I0515 10:43:32.263395 1752 kubelet.go:446] "Attempting to sync node with API server" May 15 10:43:32.263418 kubelet[1752]: I0515 10:43:32.263419 1752 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:43:32.263532 kubelet[1752]: I0515 10:43:32.263433 1752 kubelet.go:352] "Adding apiserver pod source" May 15 10:43:32.263532 kubelet[1752]: I0515 10:43:32.263439 1752 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:43:32.275628 kubelet[1752]: W0515 10:43:32.275611 1752 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 10:43:32.275682 kubelet[1752]: E0515 10:43:32.275639 1752 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:32.275710 kubelet[1752]: I0515 10:43:32.275689 1752 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:43:32.275924 kubelet[1752]: I0515 10:43:32.275912 1752 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:43:32.276413 kubelet[1752]: W0515 10:43:32.276401 1752 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:43:32.276717 kubelet[1752]: W0515 10:43:32.276691 1752 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 10:43:32.276754 kubelet[1752]: E0515 10:43:32.276724 1752 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:32.285397 kubelet[1752]: I0515 10:43:32.285383 1752 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 10:43:32.285435 kubelet[1752]: I0515 10:43:32.285406 1752 server.go:1287] "Started kubelet" May 15 10:43:32.285000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:32.285000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:43:32.285000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008a9ef0 a1=c000903e00 a2=c0008a9ec0 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.285000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:43:32.285000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:32.285000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:43:32.285000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000819440 a1=c000903e18 a2=c0008a9f80 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.285000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:43:32.286576 kubelet[1752]: I0515 10:43:32.286214 1752 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:43:32.286576 kubelet[1752]: I0515 10:43:32.286251 1752 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 10:43:32.287245 kubelet[1752]: I0515 10:43:32.287129 1752 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:43:32.287691 kubelet[1752]: E0515 10:43:32.287683 1752 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:43:32.287000 audit[1763]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:32.287000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9190d7e0 a2=0 a3=7fff9190d7cc items=0 ppid=1752 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:43:32.288000 audit[1764]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:32.288000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe09bf8e00 a2=0 a3=7ffe09bf8dec items=0 ppid=1752 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:43:32.289598 kubelet[1752]: I0515 10:43:32.289581 1752 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:43:32.290197 kubelet[1752]: I0515 10:43:32.290185 1752 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 10:43:32.290248 kubelet[1752]: I0515 10:43:32.290240 1752 server.go:490] "Adding debug handlers to kubelet server" May 15 10:43:32.290316 kubelet[1752]: E0515 10:43:32.290303 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:32.289000 audit[1766]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:32.289000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8a206a30 a2=0 a3=7ffc8a206a1c items=0 ppid=1752 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:43:32.291638 kubelet[1752]: I0515 10:43:32.291613 1752 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:43:32.291692 kubelet[1752]: I0515 10:43:32.291680 1752 reconciler.go:26] "Reconciler: start to sync state" May 15 10:43:32.291814 kubelet[1752]: I0515 10:43:32.291806 1752 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:43:32.291871 kubelet[1752]: I0515 10:43:32.291654 1752 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:43:32.291000 audit[1768]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:32.291000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe4c2a6b40 a2=0 a3=7ffe4c2a6b2c items=0 ppid=1752 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:43:32.294735 kubelet[1752]: I0515 10:43:32.294728 1752 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:43:32.294956 kubelet[1752]: E0515 10:43:32.294939 1752 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="200ms" May 15 10:43:32.295571 kubelet[1752]: I0515 10:43:32.295562 1752 factory.go:221] Registration of the systemd container factory successfully May 15 10:43:32.295651 kubelet[1752]: I0515 10:43:32.295642 1752 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:43:32.296997 kubelet[1752]: E0515 10:43:32.295867 1752 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.100:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad60ef3f0afb default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:43:32.285393659 +0000 UTC m=+0.694864123,LastTimestamp:2025-05-15 10:43:32.285393659 +0000 UTC m=+0.694864123,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:43:32.299605 kubelet[1752]: I0515 10:43:32.299595 1752 factory.go:221] Registration of the containerd container factory successfully May 15 10:43:32.300858 kubelet[1752]: W0515 10:43:32.300833 1752 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 10:43:32.300932 kubelet[1752]: E0515 10:43:32.300917 1752 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:32.308000 audit[1773]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:32.308000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca7f18a60 a2=0 a3=7ffca7f18a4c items=0 ppid=1752 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:43:32.309876 kubelet[1752]: I0515 10:43:32.309850 1752 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:43:32.309000 audit[1774]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:32.309000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdeae6d310 a2=0 a3=7ffdeae6d2fc items=0 ppid=1752 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:43:32.310602 kubelet[1752]: I0515 10:43:32.310584 1752 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:43:32.310602 kubelet[1752]: I0515 10:43:32.310594 1752 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 10:43:32.310653 kubelet[1752]: I0515 10:43:32.310604 1752 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 10:43:32.310653 kubelet[1752]: I0515 10:43:32.310608 1752 kubelet.go:2388] "Starting kubelet main sync loop" May 15 10:43:32.310653 kubelet[1752]: E0515 10:43:32.310631 1752 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:43:32.310000 audit[1775]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:32.310000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc859d1e40 a2=0 a3=7ffc859d1e2c items=0 ppid=1752 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:43:32.310000 audit[1776]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:32.310000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf4d34840 a2=0 a3=7ffcf4d3482c items=0 ppid=1752 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:43:32.311000 audit[1777]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:32.311000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca438e5c0 a2=0 a3=7ffca438e5ac items=0 ppid=1752 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:43:32.311000 audit[1778]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:32.311000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb3794630 a2=0 a3=7ffeb379461c items=0 ppid=1752 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:43:32.312000 audit[1779]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:32.312000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffefb508740 a2=0 a3=7ffefb50872c items=0 ppid=1752 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:43:32.313966 kubelet[1752]: W0515 10:43:32.313956 1752 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 10:43:32.314040 kubelet[1752]: E0515 10:43:32.314017 1752 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:32.313000 audit[1780]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:32.313000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe6101ebe0 a2=0 a3=7ffe6101ebcc items=0 ppid=1752 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:43:32.314384 kubelet[1752]: I0515 10:43:32.314238 1752 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 10:43:32.314426 kubelet[1752]: I0515 10:43:32.314418 1752 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 10:43:32.314472 kubelet[1752]: I0515 10:43:32.314465 1752 state_mem.go:36] "Initialized new in-memory state store" May 15 10:43:32.315475 kubelet[1752]: I0515 10:43:32.315468 1752 policy_none.go:49] "None policy: Start" May 15 10:43:32.315526 kubelet[1752]: I0515 10:43:32.315519 1752 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 10:43:32.315576 kubelet[1752]: I0515 10:43:32.315569 1752 state_mem.go:35] "Initializing new in-memory state store" May 15 10:43:32.318820 systemd[1]: Created slice kubepods.slice. May 15 10:43:32.321627 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:43:32.327301 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:43:32.328371 kubelet[1752]: I0515 10:43:32.328356 1752 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:43:32.327000 audit[1752]: AVC avc: denied { mac_admin } for pid=1752 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:32.327000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:43:32.327000 audit[1752]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae5380 a1=c000add2c0 a2=c000ae5350 a3=25 items=0 ppid=1 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:32.327000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:43:32.328520 kubelet[1752]: I0515 10:43:32.328401 1752 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:43:32.328520 kubelet[1752]: I0515 10:43:32.328458 1752 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:43:32.328520 kubelet[1752]: I0515 10:43:32.328466 1752 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:43:32.329072 kubelet[1752]: I0515 10:43:32.328801 1752 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:43:32.329426 kubelet[1752]: E0515 10:43:32.329269 1752 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 10:43:32.329426 kubelet[1752]: E0515 10:43:32.329290 1752 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:43:32.415937 systemd[1]: Created slice kubepods-burstable-podbec4bdd091484d8c2056a6b730f18764.slice. May 15 10:43:32.421497 kubelet[1752]: E0515 10:43:32.421408 1752 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:43:32.423338 systemd[1]: Created slice kubepods-burstable-pod5386fe11ed933ab82453de11903c7f47.slice. May 15 10:43:32.424426 kubelet[1752]: E0515 10:43:32.424336 1752 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:43:32.429815 kubelet[1752]: I0515 10:43:32.429770 1752 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:43:32.430019 kubelet[1752]: E0515 10:43:32.430000 1752 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 15 10:43:32.431215 systemd[1]: Created slice kubepods-burstable-pod2980a8ab51edc665be10a02e33130e15.slice. May 15 10:43:32.432272 kubelet[1752]: E0515 10:43:32.432258 1752 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:43:32.495951 kubelet[1752]: E0515 10:43:32.495931 1752 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="400ms" May 15 10:43:32.593468 kubelet[1752]: I0515 10:43:32.593440 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bec4bdd091484d8c2056a6b730f18764-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"bec4bdd091484d8c2056a6b730f18764\") " pod="kube-system/kube-apiserver-localhost" May 15 10:43:32.593468 kubelet[1752]: I0515 10:43:32.593466 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:32.593581 kubelet[1752]: I0515 10:43:32.593477 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:32.593581 kubelet[1752]: I0515 10:43:32.593487 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:32.593581 kubelet[1752]: I0515 10:43:32.593497 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 15 10:43:32.593581 kubelet[1752]: I0515 10:43:32.593505 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bec4bdd091484d8c2056a6b730f18764-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"bec4bdd091484d8c2056a6b730f18764\") " pod="kube-system/kube-apiserver-localhost" May 15 10:43:32.593581 kubelet[1752]: I0515 10:43:32.593521 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:32.593667 kubelet[1752]: I0515 10:43:32.593529 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:32.593667 kubelet[1752]: I0515 10:43:32.593539 1752 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bec4bdd091484d8c2056a6b730f18764-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"bec4bdd091484d8c2056a6b730f18764\") " pod="kube-system/kube-apiserver-localhost" May 15 10:43:32.631347 kubelet[1752]: I0515 10:43:32.631333 1752 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:43:32.631539 kubelet[1752]: E0515 10:43:32.631523 1752 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 15 10:43:32.722874 env[1269]: time="2025-05-15T10:43:32.722820404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:bec4bdd091484d8c2056a6b730f18764,Namespace:kube-system,Attempt:0,}" May 15 10:43:32.725043 env[1269]: time="2025-05-15T10:43:32.725009879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,}" May 15 10:43:32.732727 env[1269]: time="2025-05-15T10:43:32.732706446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,}" May 15 10:43:32.896428 kubelet[1752]: E0515 10:43:32.896408 1752 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="800ms" May 15 10:43:33.033086 kubelet[1752]: I0515 10:43:33.033014 1752 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:43:33.033468 kubelet[1752]: E0515 10:43:33.033454 1752 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 15 10:43:33.175293 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1023210378.mount: Deactivated successfully. May 15 10:43:33.177574 env[1269]: time="2025-05-15T10:43:33.177556537Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.178228 env[1269]: time="2025-05-15T10:43:33.178203418Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.178739 env[1269]: time="2025-05-15T10:43:33.178713872Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.180105 env[1269]: time="2025-05-15T10:43:33.180087762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.181701 env[1269]: time="2025-05-15T10:43:33.181685845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.183707 env[1269]: time="2025-05-15T10:43:33.183691781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.186947 env[1269]: time="2025-05-15T10:43:33.186926420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.188722 env[1269]: time="2025-05-15T10:43:33.188705644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.189919 env[1269]: time="2025-05-15T10:43:33.189906664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.190451 env[1269]: time="2025-05-15T10:43:33.190438802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.191373 env[1269]: time="2025-05-15T10:43:33.191361548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.191974 env[1269]: time="2025-05-15T10:43:33.191950798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:33.212236 env[1269]: time="2025-05-15T10:43:33.204218431Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:43:33.212236 env[1269]: time="2025-05-15T10:43:33.204235628Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:43:33.212236 env[1269]: time="2025-05-15T10:43:33.204242161Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:43:33.212236 env[1269]: time="2025-05-15T10:43:33.204334899Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3043fff68320b6232bff4320b6e25bb9d68d221e511fa9a1cb27e114172f3fd7 pid=1799 runtime=io.containerd.runc.v2 May 15 10:43:33.212571 env[1269]: time="2025-05-15T10:43:33.203643809Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:43:33.212571 env[1269]: time="2025-05-15T10:43:33.203675925Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:43:33.212571 env[1269]: time="2025-05-15T10:43:33.203682956Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:43:33.212571 env[1269]: time="2025-05-15T10:43:33.203809444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e85851e9732da9d7d1852f8751e061c43cb778348ebe95f23b04c6ce23170716 pid=1798 runtime=io.containerd.runc.v2 May 15 10:43:33.223905 systemd[1]: Started cri-containerd-3043fff68320b6232bff4320b6e25bb9d68d221e511fa9a1cb27e114172f3fd7.scope. May 15 10:43:33.235495 systemd[1]: Started cri-containerd-e85851e9732da9d7d1852f8751e061c43cb778348ebe95f23b04c6ce23170716.scope. May 15 10:43:33.243853 kernel: kauditd_printk_skb: 218 callbacks suppressed May 15 10:43:33.243915 kernel: audit: type=1400 audit(1747305813.240:462): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.247397 kernel: audit: type=1400 audit(1747305813.240:463): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.259144 kernel: audit: type=1400 audit(1747305813.240:464): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.259172 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:43:33.259189 kernel: audit: type=1400 audit(1747305813.240:465): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.259204 kernel: audit: type=1400 audit(1747305813.240:466): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.259217 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 15 10:43:33.259232 kernel: audit: type=1400 audit(1747305813.240:467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.259244 kernel: audit: backlog limit exceeded May 15 10:43:33.259258 kernel: audit: type=1400 audit(1747305813.240:468): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.241000 audit: BPF prog-id=61 op=LOAD May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1799 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343366666636383332306236323332626666343332306236653235 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1799 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343366666636383332306236323332626666343332306236653235 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit: BPF prog-id=62 op=LOAD May 15 10:43:33.246000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002871e0 items=0 ppid=1799 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343366666636383332306236323332626666343332306236653235 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit: BPF prog-id=63 op=LOAD May 15 10:43:33.246000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000287228 items=0 ppid=1799 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343366666636383332306236323332626666343332306236653235 May 15 10:43:33.246000 audit: BPF prog-id=63 op=UNLOAD May 15 10:43:33.246000 audit: BPF prog-id=62 op=UNLOAD May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.246000 audit: BPF prog-id=64 op=LOAD May 15 10:43:33.246000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000287638 items=0 ppid=1799 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343366666636383332306236323332626666343332306236653235 May 15 10:43:33.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.260000 audit: BPF prog-id=65 op=LOAD May 15 10:43:33.261000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.261000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1798 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538353835316539373332646139643764313835326638373531653036 May 15 10:43:33.278419 kubelet[1752]: W0515 10:43:33.278373 1752 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 10:43:33.278419 kubelet[1752]: E0515 10:43:33.278405 1752 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:33.287138 env[1269]: time="2025-05-15T10:43:33.287079977Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:bec4bdd091484d8c2056a6b730f18764,Namespace:kube-system,Attempt:0,} returns sandbox id \"3043fff68320b6232bff4320b6e25bb9d68d221e511fa9a1cb27e114172f3fd7\"" May 15 10:43:33.291656 env[1269]: time="2025-05-15T10:43:33.291633852Z" level=info msg="CreateContainer within sandbox \"3043fff68320b6232bff4320b6e25bb9d68d221e511fa9a1cb27e114172f3fd7\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:43:33.292876 env[1269]: time="2025-05-15T10:43:33.292854333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2980a8ab51edc665be10a02e33130e15,Namespace:kube-system,Attempt:0,} returns sandbox id \"e85851e9732da9d7d1852f8751e061c43cb778348ebe95f23b04c6ce23170716\"" May 15 10:43:33.293927 env[1269]: time="2025-05-15T10:43:33.293908316Z" level=info msg="CreateContainer within sandbox \"e85851e9732da9d7d1852f8751e061c43cb778348ebe95f23b04c6ce23170716\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:43:33.299399 env[1269]: time="2025-05-15T10:43:33.299307310Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:43:33.299399 env[1269]: time="2025-05-15T10:43:33.299330213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:43:33.299399 env[1269]: time="2025-05-15T10:43:33.299337681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:43:33.299947 env[1269]: time="2025-05-15T10:43:33.299534157Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/daf69dddf75c9d27724abe9fe26cf6055025f241de8bf49ccb3f11580090fff2 pid=1869 runtime=io.containerd.runc.v2 May 15 10:43:33.306136 systemd[1]: Started cri-containerd-daf69dddf75c9d27724abe9fe26cf6055025f241de8bf49ccb3f11580090fff2.scope. May 15 10:43:33.312615 kubelet[1752]: W0515 10:43:33.312563 1752 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 10:43:33.312615 kubelet[1752]: E0515 10:43:33.312598 1752 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:33.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit: BPF prog-id=69 op=LOAD May 15 10:43:33.316000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1869 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663639646464663735633964323737323461626539666532366366 May 15 10:43:33.316000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.316000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1869 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663639646464663735633964323737323461626539666532366366 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit: BPF prog-id=70 op=LOAD May 15 10:43:33.317000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020aa80 items=0 ppid=1869 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663639646464663735633964323737323461626539666532366366 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.317000 audit: BPF prog-id=71 op=LOAD May 15 10:43:33.317000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020aac8 items=0 ppid=1869 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663639646464663735633964323737323461626539666532366366 May 15 10:43:33.317000 audit: BPF prog-id=71 op=UNLOAD May 15 10:43:33.318000 audit: BPF prog-id=70 op=UNLOAD May 15 10:43:33.318000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.318000 audit: BPF prog-id=72 op=LOAD May 15 10:43:33.318000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020aed8 items=0 ppid=1869 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663639646464663735633964323737323461626539666532366366 May 15 10:43:33.338374 env[1269]: time="2025-05-15T10:43:33.338347112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:5386fe11ed933ab82453de11903c7f47,Namespace:kube-system,Attempt:0,} returns sandbox id \"daf69dddf75c9d27724abe9fe26cf6055025f241de8bf49ccb3f11580090fff2\"" May 15 10:43:33.339738 env[1269]: time="2025-05-15T10:43:33.339717529Z" level=info msg="CreateContainer within sandbox \"daf69dddf75c9d27724abe9fe26cf6055025f241de8bf49ccb3f11580090fff2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:43:33.353485 env[1269]: time="2025-05-15T10:43:33.353457876Z" level=info msg="CreateContainer within sandbox \"e85851e9732da9d7d1852f8751e061c43cb778348ebe95f23b04c6ce23170716\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3aec24548550ace12cb66b36c8e6a4e293655d29620bcdd52e964951da3ab90a\"" May 15 10:43:33.353930 env[1269]: time="2025-05-15T10:43:33.353917709Z" level=info msg="StartContainer for \"3aec24548550ace12cb66b36c8e6a4e293655d29620bcdd52e964951da3ab90a\"" May 15 10:43:33.355441 env[1269]: time="2025-05-15T10:43:33.355418875Z" level=info msg="CreateContainer within sandbox \"daf69dddf75c9d27724abe9fe26cf6055025f241de8bf49ccb3f11580090fff2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"44a2d9a76cf311ec5b3e8c1c58c2d3568c2cd84717032e03fcd1a8ddaec5b429\"" May 15 10:43:33.355645 env[1269]: time="2025-05-15T10:43:33.355627387Z" level=info msg="StartContainer for \"44a2d9a76cf311ec5b3e8c1c58c2d3568c2cd84717032e03fcd1a8ddaec5b429\"" May 15 10:43:33.356712 env[1269]: time="2025-05-15T10:43:33.356689419Z" level=info msg="CreateContainer within sandbox \"3043fff68320b6232bff4320b6e25bb9d68d221e511fa9a1cb27e114172f3fd7\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e10b685e185ab9581c30b98417277dfe55ebaae76a2799b321a7323d3f21ddea\"" May 15 10:43:33.356939 env[1269]: time="2025-05-15T10:43:33.356924738Z" level=info msg="StartContainer for \"e10b685e185ab9581c30b98417277dfe55ebaae76a2799b321a7323d3f21ddea\"" May 15 10:43:33.369942 systemd[1]: Started cri-containerd-3aec24548550ace12cb66b36c8e6a4e293655d29620bcdd52e964951da3ab90a.scope. May 15 10:43:33.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.378000 audit: BPF prog-id=73 op=LOAD May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1798 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656332343534383535306163653132636236366233366338653661 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1798 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656332343534383535306163653132636236366233366338653661 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit: BPF prog-id=74 op=LOAD May 15 10:43:33.379000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dc1e0 items=0 ppid=1798 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656332343534383535306163653132636236366233366338653661 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit: BPF prog-id=75 op=LOAD May 15 10:43:33.379000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dc228 items=0 ppid=1798 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656332343534383535306163653132636236366233366338653661 May 15 10:43:33.379000 audit: BPF prog-id=75 op=UNLOAD May 15 10:43:33.379000 audit: BPF prog-id=74 op=UNLOAD May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { perfmon } for pid=1924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit[1924]: AVC avc: denied { bpf } for pid=1924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.379000 audit: BPF prog-id=76 op=LOAD May 15 10:43:33.379000 audit[1924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dc638 items=0 ppid=1798 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361656332343534383535306163653132636236366233366338653661 May 15 10:43:33.385917 systemd[1]: Started cri-containerd-e10b685e185ab9581c30b98417277dfe55ebaae76a2799b321a7323d3f21ddea.scope. May 15 10:43:33.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.400000 audit: BPF prog-id=77 op=LOAD May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1799 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306236383565313835616239353831633330623938343137323737 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1799 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306236383565313835616239353831633330623938343137323737 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit: BPF prog-id=78 op=LOAD May 15 10:43:33.404000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000402d90 items=0 ppid=1799 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306236383565313835616239353831633330623938343137323737 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit: BPF prog-id=79 op=LOAD May 15 10:43:33.404000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000402dd8 items=0 ppid=1799 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306236383565313835616239353831633330623938343137323737 May 15 10:43:33.404000 audit: BPF prog-id=79 op=UNLOAD May 15 10:43:33.404000 audit: BPF prog-id=78 op=UNLOAD May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { perfmon } for pid=1933 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit[1933]: AVC avc: denied { bpf } for pid=1933 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.404000 audit: BPF prog-id=80 op=LOAD May 15 10:43:33.404000 audit[1933]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0004031e8 items=0 ppid=1799 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531306236383565313835616239353831633330623938343137323737 May 15 10:43:33.409016 systemd[1]: Started cri-containerd-44a2d9a76cf311ec5b3e8c1c58c2d3568c2cd84717032e03fcd1a8ddaec5b429.scope. May 15 10:43:33.419971 env[1269]: time="2025-05-15T10:43:33.419945013Z" level=info msg="StartContainer for \"3aec24548550ace12cb66b36c8e6a4e293655d29620bcdd52e964951da3ab90a\" returns successfully" May 15 10:43:33.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.421000 audit: BPF prog-id=81 op=LOAD May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1869 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613264396137366366333131656335623365386331633538633264 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1869 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613264396137366366333131656335623365386331633538633264 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit: BPF prog-id=82 op=LOAD May 15 10:43:33.422000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ce310 items=0 ppid=1869 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613264396137366366333131656335623365386331633538633264 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit: BPF prog-id=83 op=LOAD May 15 10:43:33.422000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ce358 items=0 ppid=1869 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613264396137366366333131656335623365386331633538633264 May 15 10:43:33.422000 audit: BPF prog-id=83 op=UNLOAD May 15 10:43:33.422000 audit: BPF prog-id=82 op=UNLOAD May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { perfmon } for pid=1931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit[1931]: AVC avc: denied { bpf } for pid=1931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:33.422000 audit: BPF prog-id=84 op=LOAD May 15 10:43:33.422000 audit[1931]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ce768 items=0 ppid=1869 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:33.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434613264396137366366333131656335623365386331633538633264 May 15 10:43:33.433856 kubelet[1752]: W0515 10:43:33.433791 1752 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 10:43:33.433856 kubelet[1752]: E0515 10:43:33.433838 1752 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:33.438268 env[1269]: time="2025-05-15T10:43:33.438212014Z" level=info msg="StartContainer for \"e10b685e185ab9581c30b98417277dfe55ebaae76a2799b321a7323d3f21ddea\" returns successfully" May 15 10:43:33.453310 kubelet[1752]: W0515 10:43:33.453280 1752 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 10:43:33.454823 kubelet[1752]: E0515 10:43:33.454808 1752 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 15 10:43:33.462082 env[1269]: time="2025-05-15T10:43:33.462061462Z" level=info msg="StartContainer for \"44a2d9a76cf311ec5b3e8c1c58c2d3568c2cd84717032e03fcd1a8ddaec5b429\" returns successfully" May 15 10:43:33.697912 kubelet[1752]: E0515 10:43:33.697877 1752 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="1.6s" May 15 10:43:33.834754 kubelet[1752]: I0515 10:43:33.834548 1752 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:43:33.834754 kubelet[1752]: E0515 10:43:33.834733 1752 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 15 10:43:34.298000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:34.298000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000cd2000 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:34.298000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:34.299000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:34.299000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0000fc180 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:34.299000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:34.318906 kubelet[1752]: E0515 10:43:34.318891 1752 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:43:34.320195 kubelet[1752]: E0515 10:43:34.320187 1752 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:43:34.321068 kubelet[1752]: E0515 10:43:34.321061 1752 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:43:34.991000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:34.991000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c006ca0120 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:43:34.991000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:43:34.991000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:34.991000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0067c9fc0 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:43:34.991000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:43:34.998000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:34.998000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0071e0720 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:43:34.998000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:43:34.999000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:34.999000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c006ca0270 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:43:34.999000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:43:35.002000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:35.002000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c0047b4160 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:43:35.002000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:43:35.038000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:35.038000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003d56000 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:43:35.038000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:43:35.301068 kubelet[1752]: E0515 10:43:35.300977 1752 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 10:43:35.322747 kubelet[1752]: E0515 10:43:35.322727 1752 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:43:35.323394 kubelet[1752]: E0515 10:43:35.323379 1752 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 15 10:43:35.372319 kubelet[1752]: E0515 10:43:35.372302 1752 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 15 10:43:35.436277 kubelet[1752]: I0515 10:43:35.436257 1752 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:43:35.445012 kubelet[1752]: I0515 10:43:35.444989 1752 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 15 10:43:35.445012 kubelet[1752]: E0515 10:43:35.445015 1752 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 15 10:43:35.447201 kubelet[1752]: E0515 10:43:35.447181 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:35.547511 kubelet[1752]: E0515 10:43:35.547482 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:35.648574 kubelet[1752]: E0515 10:43:35.648551 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:35.749235 kubelet[1752]: E0515 10:43:35.749204 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:35.850209 kubelet[1752]: E0515 10:43:35.850178 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:35.951148 kubelet[1752]: E0515 10:43:35.951076 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:36.052153 kubelet[1752]: E0515 10:43:36.052131 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:36.153007 kubelet[1752]: E0515 10:43:36.152986 1752 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:43:36.191443 kubelet[1752]: I0515 10:43:36.191421 1752 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:43:36.198617 kubelet[1752]: I0515 10:43:36.198598 1752 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 10:43:36.203047 kubelet[1752]: I0515 10:43:36.202969 1752 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:43:36.277098 kubelet[1752]: I0515 10:43:36.277076 1752 apiserver.go:52] "Watching apiserver" May 15 10:43:36.292964 kubelet[1752]: I0515 10:43:36.292942 1752 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:43:36.323780 kubelet[1752]: I0515 10:43:36.323762 1752 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:43:36.324075 kubelet[1752]: I0515 10:43:36.324067 1752 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:43:36.326942 kubelet[1752]: E0515 10:43:36.326909 1752 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 15 10:43:36.327429 kubelet[1752]: E0515 10:43:36.327407 1752 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:43:37.132762 systemd[1]: Reloading. May 15 10:43:37.200403 /usr/lib/systemd/system-generators/torcx-generator[2038]: time="2025-05-15T10:43:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:43:37.200618 /usr/lib/systemd/system-generators/torcx-generator[2038]: time="2025-05-15T10:43:37Z" level=info msg="torcx already run" May 15 10:43:37.243509 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:43:37.243618 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:43:37.255436 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:43:37.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.307000 audit: BPF prog-id=85 op=LOAD May 15 10:43:37.307000 audit: BPF prog-id=77 op=UNLOAD May 15 10:43:37.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit: BPF prog-id=86 op=LOAD May 15 10:43:37.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.308000 audit: BPF prog-id=87 op=LOAD May 15 10:43:37.308000 audit: BPF prog-id=46 op=UNLOAD May 15 10:43:37.308000 audit: BPF prog-id=47 op=UNLOAD May 15 10:43:37.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.309000 audit: BPF prog-id=88 op=LOAD May 15 10:43:37.310000 audit: BPF prog-id=48 op=UNLOAD May 15 10:43:37.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit: BPF prog-id=89 op=LOAD May 15 10:43:37.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.310000 audit: BPF prog-id=90 op=LOAD May 15 10:43:37.310000 audit: BPF prog-id=49 op=UNLOAD May 15 10:43:37.310000 audit: BPF prog-id=50 op=UNLOAD May 15 10:43:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit: BPF prog-id=91 op=LOAD May 15 10:43:37.311000 audit: BPF prog-id=51 op=UNLOAD May 15 10:43:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit: BPF prog-id=92 op=LOAD May 15 10:43:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.312000 audit: BPF prog-id=93 op=LOAD May 15 10:43:37.312000 audit: BPF prog-id=52 op=UNLOAD May 15 10:43:37.312000 audit: BPF prog-id=53 op=UNLOAD May 15 10:43:37.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit: BPF prog-id=94 op=LOAD May 15 10:43:37.313000 audit: BPF prog-id=54 op=UNLOAD May 15 10:43:37.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit: BPF prog-id=95 op=LOAD May 15 10:43:37.314000 audit: BPF prog-id=73 op=UNLOAD May 15 10:43:37.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.315000 audit: BPF prog-id=96 op=LOAD May 15 10:43:37.315000 audit: BPF prog-id=65 op=UNLOAD May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit: BPF prog-id=97 op=LOAD May 15 10:43:37.316000 audit: BPF prog-id=55 op=UNLOAD May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.317000 audit: BPF prog-id=98 op=LOAD May 15 10:43:37.317000 audit: BPF prog-id=61 op=UNLOAD May 15 10:43:37.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.318000 audit: BPF prog-id=99 op=LOAD May 15 10:43:37.319000 audit: BPF prog-id=81 op=UNLOAD May 15 10:43:37.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.319000 audit: BPF prog-id=100 op=LOAD May 15 10:43:37.320000 audit: BPF prog-id=69 op=UNLOAD May 15 10:43:37.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.320000 audit: BPF prog-id=101 op=LOAD May 15 10:43:37.320000 audit: BPF prog-id=56 op=UNLOAD May 15 10:43:37.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.321000 audit: BPF prog-id=102 op=LOAD May 15 10:43:37.321000 audit: BPF prog-id=57 op=UNLOAD May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit: BPF prog-id=103 op=LOAD May 15 10:43:37.323000 audit: BPF prog-id=58 op=UNLOAD May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit: BPF prog-id=104 op=LOAD May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:37.323000 audit: BPF prog-id=105 op=LOAD May 15 10:43:37.323000 audit: BPF prog-id=59 op=UNLOAD May 15 10:43:37.323000 audit: BPF prog-id=60 op=UNLOAD May 15 10:43:37.337476 systemd[1]: Stopping kubelet.service... May 15 10:43:37.353314 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:43:37.353554 systemd[1]: Stopped kubelet.service. May 15 10:43:37.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:37.355589 systemd[1]: Starting kubelet.service... May 15 10:43:37.644000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7345 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:43:37.644000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005ca280 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:37.644000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:38.761888 systemd[1]: Started kubelet.service. May 15 10:43:38.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:38.771369 kernel: kauditd_printk_skb: 668 callbacks suppressed May 15 10:43:38.771447 kernel: audit: type=1130 audit(1747305818.761:817): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:38.882656 kubelet[2102]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:43:38.882656 kubelet[2102]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 10:43:38.882656 kubelet[2102]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:43:38.882930 kubelet[2102]: I0515 10:43:38.882698 2102 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:43:38.892461 kubelet[2102]: I0515 10:43:38.892445 2102 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 10:43:38.892592 kubelet[2102]: I0515 10:43:38.892584 2102 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:43:38.892984 kubelet[2102]: I0515 10:43:38.892975 2102 server.go:954] "Client rotation is on, will bootstrap in background" May 15 10:43:38.921046 kernel: audit: type=1400 audit(1747305818.911:818): avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:38.921125 kernel: audit: type=1300 audit(1747305818.911:818): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8d200 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:38.911000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:38.911000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8d200 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:38.921255 kubelet[2102]: I0515 10:43:38.913759 2102 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:43:38.921255 kubelet[2102]: I0515 10:43:38.915450 2102 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:43:38.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:38.926040 kernel: audit: type=1327 audit(1747305818.911:818): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:38.924000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:38.924000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e5cf40 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:38.938081 kernel: audit: type=1400 audit(1747305818.924:819): avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:38.938113 kernel: audit: type=1300 audit(1747305818.924:819): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e5cf40 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:38.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:38.925000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:38.944283 kernel: audit: type=1327 audit(1747305818.924:819): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:38.944312 kernel: audit: type=1400 audit(1747305818.925:820): avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:38.944328 kernel: audit: type=1300 audit(1747305818.925:820): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e5cf80 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:38.925000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e5cf80 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:38.948155 kernel: audit: type=1327 audit(1747305818.925:820): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:38.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:38.925000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:43:38.925000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e5cfc0 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:43:38.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:43:38.962693 kubelet[2102]: E0515 10:43:38.962673 2102 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:43:38.962693 kubelet[2102]: I0515 10:43:38.962693 2102 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:43:38.964561 kubelet[2102]: I0515 10:43:38.964549 2102 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:43:38.964675 kubelet[2102]: I0515 10:43:38.964655 2102 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:43:38.964801 kubelet[2102]: I0515 10:43:38.964675 2102 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:43:38.964873 kubelet[2102]: I0515 10:43:38.964802 2102 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:43:38.964873 kubelet[2102]: I0515 10:43:38.964809 2102 container_manager_linux.go:304] "Creating device plugin manager" May 15 10:43:38.964873 kubelet[2102]: I0515 10:43:38.964831 2102 state_mem.go:36] "Initialized new in-memory state store" May 15 10:43:38.964950 kubelet[2102]: I0515 10:43:38.964937 2102 kubelet.go:446] "Attempting to sync node with API server" May 15 10:43:38.964950 kubelet[2102]: I0515 10:43:38.964946 2102 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:43:38.965000 kubelet[2102]: I0515 10:43:38.964958 2102 kubelet.go:352] "Adding apiserver pod source" May 15 10:43:38.965000 kubelet[2102]: I0515 10:43:38.964963 2102 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:43:38.965684 kubelet[2102]: I0515 10:43:38.965674 2102 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:43:38.966574 kubelet[2102]: I0515 10:43:38.966562 2102 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:43:38.967002 kubelet[2102]: I0515 10:43:38.966991 2102 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 10:43:38.967078 kubelet[2102]: I0515 10:43:38.967070 2102 server.go:1287] "Started kubelet" May 15 10:43:38.967000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:38.967000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:43:38.967000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b01680 a1=c0007533c8 a2=c000b01650 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:38.967000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:43:38.971054 kubelet[2102]: I0515 10:43:38.971013 2102 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:43:38.970000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:38.970000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:43:38.970000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b16600 a1=c0007533e0 a2=c000b01710 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:38.970000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:43:38.977905 kubelet[2102]: I0515 10:43:38.973601 2102 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:43:38.977905 kubelet[2102]: I0515 10:43:38.973738 2102 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:43:38.977905 kubelet[2102]: I0515 10:43:38.973763 2102 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:43:38.977905 kubelet[2102]: I0515 10:43:38.974353 2102 server.go:490] "Adding debug handlers to kubelet server" May 15 10:43:38.980114 kubelet[2102]: I0515 10:43:38.980098 2102 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 10:43:38.981087 kubelet[2102]: I0515 10:43:38.981073 2102 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:43:38.990940 kubelet[2102]: I0515 10:43:38.990925 2102 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:43:38.993955 kubelet[2102]: I0515 10:43:38.993940 2102 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 10:43:38.994231 kubelet[2102]: I0515 10:43:38.994222 2102 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:43:38.994386 kubelet[2102]: I0515 10:43:38.994380 2102 reconciler.go:26] "Reconciler: start to sync state" May 15 10:43:38.995703 kubelet[2102]: I0515 10:43:38.995652 2102 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:43:38.996589 kubelet[2102]: I0515 10:43:38.996575 2102 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:43:38.996637 kubelet[2102]: I0515 10:43:38.996594 2102 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 10:43:38.996637 kubelet[2102]: I0515 10:43:38.996607 2102 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 10:43:38.996637 kubelet[2102]: I0515 10:43:38.996611 2102 kubelet.go:2388] "Starting kubelet main sync loop" May 15 10:43:38.997039 kubelet[2102]: E0515 10:43:38.996636 2102 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:43:38.997614 kubelet[2102]: E0515 10:43:38.997604 2102 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:43:38.999250 kubelet[2102]: I0515 10:43:38.999239 2102 factory.go:221] Registration of the systemd container factory successfully May 15 10:43:38.999368 kubelet[2102]: I0515 10:43:38.999357 2102 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:43:39.001816 kubelet[2102]: I0515 10:43:39.001793 2102 factory.go:221] Registration of the containerd container factory successfully May 15 10:43:39.044443 kubelet[2102]: I0515 10:43:39.044387 2102 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 10:43:39.044443 kubelet[2102]: I0515 10:43:39.044399 2102 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 10:43:39.044443 kubelet[2102]: I0515 10:43:39.044411 2102 state_mem.go:36] "Initialized new in-memory state store" May 15 10:43:39.044559 kubelet[2102]: I0515 10:43:39.044540 2102 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:43:39.044559 kubelet[2102]: I0515 10:43:39.044549 2102 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:43:39.044596 kubelet[2102]: I0515 10:43:39.044560 2102 policy_none.go:49] "None policy: Start" May 15 10:43:39.044596 kubelet[2102]: I0515 10:43:39.044565 2102 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 10:43:39.044596 kubelet[2102]: I0515 10:43:39.044572 2102 state_mem.go:35] "Initializing new in-memory state store" May 15 10:43:39.045064 kubelet[2102]: I0515 10:43:39.044651 2102 state_mem.go:75] "Updated machine memory state" May 15 10:43:39.047808 kubelet[2102]: I0515 10:43:39.047793 2102 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:43:39.046000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:39.046000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:43:39.046000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010c7aa0 a1=c000753ea8 a2=c0010c7a70 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:39.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:43:39.047986 kubelet[2102]: I0515 10:43:39.047825 2102 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:43:39.047986 kubelet[2102]: I0515 10:43:39.047894 2102 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:43:39.047986 kubelet[2102]: I0515 10:43:39.047901 2102 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:43:39.048463 kubelet[2102]: I0515 10:43:39.048451 2102 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:43:39.049395 kubelet[2102]: E0515 10:43:39.049358 2102 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 10:43:39.102218 kubelet[2102]: I0515 10:43:39.102192 2102 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 15 10:43:39.102350 kubelet[2102]: I0515 10:43:39.102333 2102 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 15 10:43:39.102458 kubelet[2102]: I0515 10:43:39.102261 2102 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 15 10:43:39.107771 kubelet[2102]: E0515 10:43:39.107747 2102 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 15 10:43:39.108043 kubelet[2102]: E0515 10:43:39.107980 2102 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:43:39.108263 kubelet[2102]: E0515 10:43:39.108251 2102 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 15 10:43:39.152289 kubelet[2102]: I0515 10:43:39.152273 2102 kubelet_node_status.go:76] "Attempting to register node" node="localhost" May 15 10:43:39.157397 kubelet[2102]: I0515 10:43:39.157378 2102 kubelet_node_status.go:125] "Node was previously registered" node="localhost" May 15 10:43:39.157558 kubelet[2102]: I0515 10:43:39.157550 2102 kubelet_node_status.go:79] "Successfully registered node" node="localhost" May 15 10:43:39.295674 kubelet[2102]: I0515 10:43:39.295596 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bec4bdd091484d8c2056a6b730f18764-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"bec4bdd091484d8c2056a6b730f18764\") " pod="kube-system/kube-apiserver-localhost" May 15 10:43:39.295808 kubelet[2102]: I0515 10:43:39.295795 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:39.295902 kubelet[2102]: I0515 10:43:39.295890 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bec4bdd091484d8c2056a6b730f18764-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"bec4bdd091484d8c2056a6b730f18764\") " pod="kube-system/kube-apiserver-localhost" May 15 10:43:39.295990 kubelet[2102]: I0515 10:43:39.295974 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bec4bdd091484d8c2056a6b730f18764-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"bec4bdd091484d8c2056a6b730f18764\") " pod="kube-system/kube-apiserver-localhost" May 15 10:43:39.296085 kubelet[2102]: I0515 10:43:39.296073 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:39.296171 kubelet[2102]: I0515 10:43:39.296159 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:39.296258 kubelet[2102]: I0515 10:43:39.296247 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:39.296358 kubelet[2102]: I0515 10:43:39.296346 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5386fe11ed933ab82453de11903c7f47-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"5386fe11ed933ab82453de11903c7f47\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:43:39.296520 kubelet[2102]: I0515 10:43:39.296507 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2980a8ab51edc665be10a02e33130e15-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2980a8ab51edc665be10a02e33130e15\") " pod="kube-system/kube-scheduler-localhost" May 15 10:43:39.966171 kubelet[2102]: I0515 10:43:39.966147 2102 apiserver.go:52] "Watching apiserver" May 15 10:43:39.994711 kubelet[2102]: I0515 10:43:39.994687 2102 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:43:40.090817 kubelet[2102]: I0515 10:43:40.090779 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=4.090763775 podStartE2EDuration="4.090763775s" podCreationTimestamp="2025-05-15 10:43:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:43:40.065696572 +0000 UTC m=+1.240352532" watchObservedRunningTime="2025-05-15 10:43:40.090763775 +0000 UTC m=+1.265419726" May 15 10:43:40.115420 kubelet[2102]: I0515 10:43:40.115387 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=4.115375794 podStartE2EDuration="4.115375794s" podCreationTimestamp="2025-05-15 10:43:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:43:40.090933966 +0000 UTC m=+1.265589927" watchObservedRunningTime="2025-05-15 10:43:40.115375794 +0000 UTC m=+1.290031748" May 15 10:43:40.158526 kubelet[2102]: I0515 10:43:40.158486 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=4.158473392 podStartE2EDuration="4.158473392s" podCreationTimestamp="2025-05-15 10:43:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:43:40.118776185 +0000 UTC m=+1.293432146" watchObservedRunningTime="2025-05-15 10:43:40.158473392 +0000 UTC m=+1.333129352" May 15 10:43:42.317966 kubelet[2102]: I0515 10:43:42.317945 2102 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:43:42.318492 env[1269]: time="2025-05-15T10:43:42.318467906Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:43:42.318655 kubelet[2102]: I0515 10:43:42.318641 2102 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:43:42.915176 kubelet[2102]: I0515 10:43:42.915153 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3edad2ce-3103-42ab-85e8-3e03d9e16e6f-xtables-lock\") pod \"kube-proxy-sc5c9\" (UID: \"3edad2ce-3103-42ab-85e8-3e03d9e16e6f\") " pod="kube-system/kube-proxy-sc5c9" May 15 10:43:42.915176 kubelet[2102]: I0515 10:43:42.915176 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sfrhr\" (UniqueName: \"kubernetes.io/projected/3edad2ce-3103-42ab-85e8-3e03d9e16e6f-kube-api-access-sfrhr\") pod \"kube-proxy-sc5c9\" (UID: \"3edad2ce-3103-42ab-85e8-3e03d9e16e6f\") " pod="kube-system/kube-proxy-sc5c9" May 15 10:43:42.915292 kubelet[2102]: I0515 10:43:42.915190 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/3edad2ce-3103-42ab-85e8-3e03d9e16e6f-kube-proxy\") pod \"kube-proxy-sc5c9\" (UID: \"3edad2ce-3103-42ab-85e8-3e03d9e16e6f\") " pod="kube-system/kube-proxy-sc5c9" May 15 10:43:42.915292 kubelet[2102]: I0515 10:43:42.915200 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3edad2ce-3103-42ab-85e8-3e03d9e16e6f-lib-modules\") pod \"kube-proxy-sc5c9\" (UID: \"3edad2ce-3103-42ab-85e8-3e03d9e16e6f\") " pod="kube-system/kube-proxy-sc5c9" May 15 10:43:42.918404 systemd[1]: Created slice kubepods-besteffort-pod3edad2ce_3103_42ab_85e8_3e03d9e16e6f.slice. May 15 10:43:43.021092 kubelet[2102]: I0515 10:43:43.021042 2102 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 10:43:43.225450 env[1269]: time="2025-05-15T10:43:43.225394714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sc5c9,Uid:3edad2ce-3103-42ab-85e8-3e03d9e16e6f,Namespace:kube-system,Attempt:0,}" May 15 10:43:43.237054 env[1269]: time="2025-05-15T10:43:43.236339377Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:43:43.237054 env[1269]: time="2025-05-15T10:43:43.236374709Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:43:43.237054 env[1269]: time="2025-05-15T10:43:43.236386532Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:43:43.237054 env[1269]: time="2025-05-15T10:43:43.236478229Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d60cc66824e4eb3939b72adfc2f608d60a1de8ab5591d4fca67f1290063311ae pid=2177 runtime=io.containerd.runc.v2 May 15 10:43:43.256382 systemd[1]: run-containerd-runc-k8s.io-d60cc66824e4eb3939b72adfc2f608d60a1de8ab5591d4fca67f1290063311ae-runc.CBLGHl.mount: Deactivated successfully. May 15 10:43:43.258524 systemd[1]: Started cri-containerd-d60cc66824e4eb3939b72adfc2f608d60a1de8ab5591d4fca67f1290063311ae.scope. May 15 10:43:43.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.273000 audit: BPF prog-id=106 op=LOAD May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436306363363638323465346562333933396237326164666332663630 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436306363363638323465346562333933396237326164666332663630 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit: BPF prog-id=107 op=LOAD May 15 10:43:43.274000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000308520 items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436306363363638323465346562333933396237326164666332663630 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.274000 audit: BPF prog-id=108 op=LOAD May 15 10:43:43.274000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000308568 items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436306363363638323465346562333933396237326164666332663630 May 15 10:43:43.274000 audit: BPF prog-id=108 op=UNLOAD May 15 10:43:43.275000 audit: BPF prog-id=107 op=UNLOAD May 15 10:43:43.275000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.275000 audit: BPF prog-id=109 op=LOAD May 15 10:43:43.275000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000308978 items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436306363363638323465346562333933396237326164666332663630 May 15 10:43:43.286930 env[1269]: time="2025-05-15T10:43:43.286904839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sc5c9,Uid:3edad2ce-3103-42ab-85e8-3e03d9e16e6f,Namespace:kube-system,Attempt:0,} returns sandbox id \"d60cc66824e4eb3939b72adfc2f608d60a1de8ab5591d4fca67f1290063311ae\"" May 15 10:43:43.291808 env[1269]: time="2025-05-15T10:43:43.291785041Z" level=info msg="CreateContainer within sandbox \"d60cc66824e4eb3939b72adfc2f608d60a1de8ab5591d4fca67f1290063311ae\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:43:43.302302 env[1269]: time="2025-05-15T10:43:43.302269252Z" level=info msg="CreateContainer within sandbox \"d60cc66824e4eb3939b72adfc2f608d60a1de8ab5591d4fca67f1290063311ae\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6dd6748d8f2a47acf2154a7de27051cbdf6c9df4e1b24471e482cb7307b95669\"" May 15 10:43:43.303550 env[1269]: time="2025-05-15T10:43:43.303532870Z" level=info msg="StartContainer for \"6dd6748d8f2a47acf2154a7de27051cbdf6c9df4e1b24471e482cb7307b95669\"" May 15 10:43:43.323059 systemd[1]: Started cri-containerd-6dd6748d8f2a47acf2154a7de27051cbdf6c9df4e1b24471e482cb7307b95669.scope. May 15 10:43:43.335429 systemd[1]: Created slice kubepods-besteffort-pode6e9fd7a_7b48_408a_a62b_1b7612a17e21.slice. May 15 10:43:43.368000 audit[1472]: USER_END pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:43.368000 audit[1472]: CRED_DISP pid=1472 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:43:43.369539 sudo[1472]: pam_unix(sudo:session): session closed for user root May 15 10:43:43.372423 sshd[1468]: pam_unix(sshd:session): session closed for user core May 15 10:43:43.372000 audit[1468]: USER_END pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:43.372000 audit[1468]: CRED_DISP pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:43:43.374320 systemd[1]: sshd@6-139.178.70.100:22-147.75.109.163:58712.service: Deactivated successfully. May 15 10:43:43.374805 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:43:43.374899 systemd[1]: session-9.scope: Consumed 2.456s CPU time. May 15 10:43:43.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:58712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:43:43.375331 systemd-logind[1240]: Session 9 logged out. Waiting for processes to exit. May 15 10:43:43.376023 systemd-logind[1240]: Removed session 9. May 15 10:43:43.376000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7a54653888 items=0 ppid=2177 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643637343864386632613437616366323135346137646532373035 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.376000 audit: BPF prog-id=110 op=LOAD May 15 10:43:43.376000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00035bd78 items=0 ppid=2177 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643637343864386632613437616366323135346137646532373035 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.377000 audit: BPF prog-id=111 op=LOAD May 15 10:43:43.377000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00035bdc8 items=0 ppid=2177 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643637343864386632613437616366323135346137646532373035 May 15 10:43:43.377000 audit: BPF prog-id=111 op=UNLOAD May 15 10:43:43.377000 audit: BPF prog-id=110 op=UNLOAD May 15 10:43:43.378000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.378000 audit: BPF prog-id=112 op=LOAD May 15 10:43:43.378000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00035be58 items=0 ppid=2177 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643637343864386632613437616366323135346137646532373035 May 15 10:43:43.389588 env[1269]: time="2025-05-15T10:43:43.389558773Z" level=info msg="StartContainer for \"6dd6748d8f2a47acf2154a7de27051cbdf6c9df4e1b24471e482cb7307b95669\" returns successfully" May 15 10:43:43.519524 kubelet[2102]: I0515 10:43:43.519425 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e6e9fd7a-7b48-408a-a62b-1b7612a17e21-var-lib-calico\") pod \"tigera-operator-789496d6f5-rwtq9\" (UID: \"e6e9fd7a-7b48-408a-a62b-1b7612a17e21\") " pod="tigera-operator/tigera-operator-789496d6f5-rwtq9" May 15 10:43:43.519524 kubelet[2102]: I0515 10:43:43.519475 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-756sr\" (UniqueName: \"kubernetes.io/projected/e6e9fd7a-7b48-408a-a62b-1b7612a17e21-kube-api-access-756sr\") pod \"tigera-operator-789496d6f5-rwtq9\" (UID: \"e6e9fd7a-7b48-408a-a62b-1b7612a17e21\") " pod="tigera-operator/tigera-operator-789496d6f5-rwtq9" May 15 10:43:43.638239 env[1269]: time="2025-05-15T10:43:43.638160109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-rwtq9,Uid:e6e9fd7a-7b48-408a-a62b-1b7612a17e21,Namespace:tigera-operator,Attempt:0,}" May 15 10:43:43.655994 env[1269]: time="2025-05-15T10:43:43.655920917Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:43:43.655994 env[1269]: time="2025-05-15T10:43:43.655953997Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:43:43.655994 env[1269]: time="2025-05-15T10:43:43.655963903Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:43:43.657094 env[1269]: time="2025-05-15T10:43:43.656411099Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c854d841f5566b2787b449b1118f8b0c3054471654e05b8ae8621b54cbe990c7 pid=2258 runtime=io.containerd.runc.v2 May 15 10:43:43.665298 systemd[1]: Started cri-containerd-c854d841f5566b2787b449b1118f8b0c3054471654e05b8ae8621b54cbe990c7.scope. May 15 10:43:43.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit: BPF prog-id=113 op=LOAD May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2258 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353464383431663535363662323738376234343962313131386638 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2258 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353464383431663535363662323738376234343962313131386638 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit: BPF prog-id=114 op=LOAD May 15 10:43:43.675000 audit[2268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000279d90 items=0 ppid=2258 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353464383431663535363662323738376234343962313131386638 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit: BPF prog-id=115 op=LOAD May 15 10:43:43.675000 audit[2268]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000279dd8 items=0 ppid=2258 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353464383431663535363662323738376234343962313131386638 May 15 10:43:43.675000 audit: BPF prog-id=115 op=UNLOAD May 15 10:43:43.675000 audit: BPF prog-id=114 op=UNLOAD May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { perfmon } for pid=2268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit[2268]: AVC avc: denied { bpf } for pid=2268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:43.675000 audit: BPF prog-id=116 op=LOAD May 15 10:43:43.675000 audit[2268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ee1e8 items=0 ppid=2258 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:43.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353464383431663535363662323738376234343962313131386638 May 15 10:43:43.702079 env[1269]: time="2025-05-15T10:43:43.702052022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-rwtq9,Uid:e6e9fd7a-7b48-408a-a62b-1b7612a17e21,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c854d841f5566b2787b449b1118f8b0c3054471654e05b8ae8621b54cbe990c7\"" May 15 10:43:43.703623 env[1269]: time="2025-05-15T10:43:43.703607407Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:43:44.051921 kubelet[2102]: I0515 10:43:44.051884 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-sc5c9" podStartSLOduration=2.051858423 podStartE2EDuration="2.051858423s" podCreationTimestamp="2025-05-15 10:43:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:43:44.043292447 +0000 UTC m=+5.217948407" watchObservedRunningTime="2025-05-15 10:43:44.051858423 +0000 UTC m=+5.226514382" May 15 10:43:44.288591 kernel: kauditd_printk_skb: 177 callbacks suppressed May 15 10:43:44.288692 kernel: audit: type=1325 audit(1747305824.285:872): table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.285000 audit[2322]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.285000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd904d9d10 a2=0 a3=7ffd904d9cfc items=0 ppid=2232 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.293230 kernel: audit: type=1300 audit(1747305824.285:872): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd904d9d10 a2=0 a3=7ffd904d9cfc items=0 ppid=2232 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.293272 kernel: audit: type=1327 audit(1747305824.285:872): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:43:44.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:43:44.285000 audit[2324]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.297021 kernel: audit: type=1325 audit(1747305824.285:873): table=nat:39 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.297057 kernel: audit: type=1300 audit(1747305824.285:873): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea5085be0 a2=0 a3=7ffea5085bcc items=0 ppid=2232 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.285000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea5085be0 a2=0 a3=7ffea5085bcc items=0 ppid=2232 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:43:44.302425 kernel: audit: type=1327 audit(1747305824.285:873): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:43:44.302463 kernel: audit: type=1325 audit(1747305824.287:874): table=filter:40 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.287000 audit[2325]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.287000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0e055120 a2=0 a3=7ffd0e05510c items=0 ppid=2232 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.308037 kernel: audit: type=1300 audit(1747305824.287:874): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0e055120 a2=0 a3=7ffd0e05510c items=0 ppid=2232 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.308068 kernel: audit: type=1327 audit(1747305824.287:874): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:43:44.287000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:43:44.289000 audit[2326]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.311649 kernel: audit: type=1325 audit(1747305824.289:875): table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.289000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0808c320 a2=0 a3=7ffd0808c30c items=0 ppid=2232 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:43:44.289000 audit[2327]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.289000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe56555480 a2=0 a3=7ffe5655546c items=0 ppid=2232 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:43:44.289000 audit[2328]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.289000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda2770dc0 a2=0 a3=7ffda2770dac items=0 ppid=2232 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:43:44.402000 audit[2329]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.402000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe2321ac70 a2=0 a3=7ffe2321ac5c items=0 ppid=2232 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:43:44.407000 audit[2331]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.407000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe99313e00 a2=0 a3=7ffe99313dec items=0 ppid=2232 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:43:44.412000 audit[2334]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.412000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcbcbbbbc0 a2=0 a3=7ffcbcbbbbac items=0 ppid=2232 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:43:44.413000 audit[2335]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.413000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff47b3d630 a2=0 a3=7fff47b3d61c items=0 ppid=2232 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:43:44.415000 audit[2337]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.415000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdaabbd8d0 a2=0 a3=7ffdaabbd8bc items=0 ppid=2232 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:43:44.416000 audit[2338]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.416000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7f645d50 a2=0 a3=7ffc7f645d3c items=0 ppid=2232 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:43:44.420000 audit[2340]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.420000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc2b8eb7d0 a2=0 a3=7ffc2b8eb7bc items=0 ppid=2232 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:43:44.423000 audit[2343]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.423000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc1db6f860 a2=0 a3=7ffc1db6f84c items=0 ppid=2232 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:43:44.424000 audit[2344]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.424000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff123b1a0 a2=0 a3=7ffff123b18c items=0 ppid=2232 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:43:44.426000 audit[2346]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.426000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2ff258d0 a2=0 a3=7fff2ff258bc items=0 ppid=2232 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:43:44.427000 audit[2347]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.427000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3b2da050 a2=0 a3=7ffc3b2da03c items=0 ppid=2232 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:43:44.429000 audit[2349]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.429000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2470fb20 a2=0 a3=7fff2470fb0c items=0 ppid=2232 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:43:44.431000 audit[2352]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.431000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeaf230740 a2=0 a3=7ffeaf23072c items=0 ppid=2232 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:43:44.434000 audit[2355]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.434000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc79081260 a2=0 a3=7ffc7908124c items=0 ppid=2232 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:43:44.435000 audit[2356]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.435000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe68402c00 a2=0 a3=7ffe68402bec items=0 ppid=2232 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:43:44.437000 audit[2358]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.437000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe7a600f10 a2=0 a3=7ffe7a600efc items=0 ppid=2232 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:43:44.440000 audit[2361]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.440000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8334a140 a2=0 a3=7ffd8334a12c items=0 ppid=2232 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:43:44.441000 audit[2362]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.441000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddd053e20 a2=0 a3=7ffddd053e0c items=0 ppid=2232 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:43:44.443000 audit[2364]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:43:44.443000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffeebb36d30 a2=0 a3=7ffeebb36d1c items=0 ppid=2232 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:43:44.527000 audit[2370]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:44.527000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffeb829bee0 a2=0 a3=7ffeb829becc items=0 ppid=2232 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:44.541000 audit[2370]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:44.541000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffeb829bee0 a2=0 a3=7ffeb829becc items=0 ppid=2232 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:44.542000 audit[2378]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.542000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffef1d4ebf0 a2=0 a3=7ffef1d4ebdc items=0 ppid=2232 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:43:44.545000 audit[2380]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.545000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc69c92800 a2=0 a3=7ffc69c927ec items=0 ppid=2232 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:43:44.549000 audit[2383]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.549000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd6d7e8d40 a2=0 a3=7ffd6d7e8d2c items=0 ppid=2232 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:43:44.550000 audit[2384]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.550000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd26b8d7b0 a2=0 a3=7ffd26b8d79c items=0 ppid=2232 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:43:44.552000 audit[2386]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.552000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbdf7fa30 a2=0 a3=7ffdbdf7fa1c items=0 ppid=2232 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:43:44.554000 audit[2387]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.554000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1b9c59d0 a2=0 a3=7ffd1b9c59bc items=0 ppid=2232 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:43:44.556000 audit[2389]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.556000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe17ea9610 a2=0 a3=7ffe17ea95fc items=0 ppid=2232 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:43:44.559000 audit[2392]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.559000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff4ac94330 a2=0 a3=7fff4ac9431c items=0 ppid=2232 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:43:44.560000 audit[2393]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.560000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe085e32b0 a2=0 a3=7ffe085e329c items=0 ppid=2232 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:43:44.561000 audit[2395]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.561000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdf679e00 a2=0 a3=7fffdf679dec items=0 ppid=2232 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:43:44.562000 audit[2396]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.562000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7faabaf0 a2=0 a3=7fff7faabadc items=0 ppid=2232 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:43:44.564000 audit[2398]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.564000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3a28dce0 a2=0 a3=7fff3a28dccc items=0 ppid=2232 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:43:44.566000 audit[2401]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.566000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2e52af00 a2=0 a3=7ffc2e52aeec items=0 ppid=2232 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:43:44.569000 audit[2404]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.569000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe79b547a0 a2=0 a3=7ffe79b5478c items=0 ppid=2232 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:43:44.570000 audit[2405]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.570000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde39ff380 a2=0 a3=7ffde39ff36c items=0 ppid=2232 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:43:44.572000 audit[2407]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.572000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe10c53cf0 a2=0 a3=7ffe10c53cdc items=0 ppid=2232 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:43:44.575000 audit[2410]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.575000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcbf9608c0 a2=0 a3=7ffcbf9608ac items=0 ppid=2232 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:43:44.576000 audit[2411]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.576000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3bdea920 a2=0 a3=7ffe3bdea90c items=0 ppid=2232 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:43:44.578000 audit[2413]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.578000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe7efc19e0 a2=0 a3=7ffe7efc19cc items=0 ppid=2232 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:43:44.579000 audit[2414]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.579000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff600cd280 a2=0 a3=7fff600cd26c items=0 ppid=2232 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:43:44.582000 audit[2416]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.582000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca125b7d0 a2=0 a3=7ffca125b7bc items=0 ppid=2232 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:43:44.584000 audit[2419]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:43:44.584000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb0795dc0 a2=0 a3=7ffdb0795dac items=0 ppid=2232 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:43:44.586000 audit[2421]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:43:44.586000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffec5182ba0 a2=0 a3=7ffec5182b8c items=0 ppid=2232 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.586000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:44.587000 audit[2421]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:43:44.587000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffec5182ba0 a2=0 a3=7ffec5182b8c items=0 ppid=2232 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:44.587000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:45.487536 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3355078858.mount: Deactivated successfully. May 15 10:43:45.961389 env[1269]: time="2025-05-15T10:43:45.961360445Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:45.962753 env[1269]: time="2025-05-15T10:43:45.962739805Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:45.963429 env[1269]: time="2025-05-15T10:43:45.963415556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:45.964350 env[1269]: time="2025-05-15T10:43:45.964338001Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:45.964743 env[1269]: time="2025-05-15T10:43:45.964727055Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 10:43:45.967979 env[1269]: time="2025-05-15T10:43:45.967958300Z" level=info msg="CreateContainer within sandbox \"c854d841f5566b2787b449b1118f8b0c3054471654e05b8ae8621b54cbe990c7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:43:45.974730 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2296678053.mount: Deactivated successfully. May 15 10:43:45.976382 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3517063650.mount: Deactivated successfully. May 15 10:43:45.980491 env[1269]: time="2025-05-15T10:43:45.980464699Z" level=info msg="CreateContainer within sandbox \"c854d841f5566b2787b449b1118f8b0c3054471654e05b8ae8621b54cbe990c7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"0944983364fca75900b889b4ed3eb0c703cf6ea84fe8b9a11d6f8722587ec4ab\"" May 15 10:43:45.980992 env[1269]: time="2025-05-15T10:43:45.980976553Z" level=info msg="StartContainer for \"0944983364fca75900b889b4ed3eb0c703cf6ea84fe8b9a11d6f8722587ec4ab\"" May 15 10:43:45.998722 systemd[1]: Started cri-containerd-0944983364fca75900b889b4ed3eb0c703cf6ea84fe8b9a11d6f8722587ec4ab.scope. May 15 10:43:46.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.009000 audit: BPF prog-id=117 op=LOAD May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2258 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:46.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343439383333363466636137353930306238383962346564336562 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2258 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:46.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343439383333363466636137353930306238383962346564336562 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit: BPF prog-id=118 op=LOAD May 15 10:43:46.010000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00032cc70 items=0 ppid=2258 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:46.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343439383333363466636137353930306238383962346564336562 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit: BPF prog-id=119 op=LOAD May 15 10:43:46.010000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00032ccb8 items=0 ppid=2258 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:46.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343439383333363466636137353930306238383962346564336562 May 15 10:43:46.010000 audit: BPF prog-id=119 op=UNLOAD May 15 10:43:46.010000 audit: BPF prog-id=118 op=UNLOAD May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:46.010000 audit: BPF prog-id=120 op=LOAD May 15 10:43:46.010000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00032d0c8 items=0 ppid=2258 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:46.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343439383333363466636137353930306238383962346564336562 May 15 10:43:46.025128 env[1269]: time="2025-05-15T10:43:46.025103013Z" level=info msg="StartContainer for \"0944983364fca75900b889b4ed3eb0c703cf6ea84fe8b9a11d6f8722587ec4ab\" returns successfully" May 15 10:43:46.050255 kubelet[2102]: I0515 10:43:46.050063 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-rwtq9" podStartSLOduration=0.787398341 podStartE2EDuration="3.05004907s" podCreationTimestamp="2025-05-15 10:43:43 +0000 UTC" firstStartedPulling="2025-05-15 10:43:43.70308517 +0000 UTC m=+4.877741124" lastFinishedPulling="2025-05-15 10:43:45.965735902 +0000 UTC m=+7.140391853" observedRunningTime="2025-05-15 10:43:46.04969746 +0000 UTC m=+7.224353432" watchObservedRunningTime="2025-05-15 10:43:46.05004907 +0000 UTC m=+7.224705021" May 15 10:43:48.877000 audit[2463]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:48.877000 audit[2463]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe1ddbcb10 a2=0 a3=7ffe1ddbcafc items=0 ppid=2232 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:48.877000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:48.880000 audit[2463]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2463 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:48.880000 audit[2463]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe1ddbcb10 a2=0 a3=0 items=0 ppid=2232 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:48.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:48.888000 audit[2465]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2465 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:48.888000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc7a0e8e80 a2=0 a3=7ffc7a0e8e6c items=0 ppid=2232 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:48.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:48.894000 audit[2465]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2465 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:48.894000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc7a0e8e80 a2=0 a3=0 items=0 ppid=2232 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:48.894000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:49.181588 systemd[1]: Created slice kubepods-besteffort-podb0557d90_fa0e_4f2e_a3f1_8d3ee678c8e0.slice. May 15 10:43:49.222615 systemd[1]: Created slice kubepods-besteffort-pod41ddcf48_157b_4c90_b249_ba59f277cd7e.slice. May 15 10:43:49.255208 kubelet[2102]: I0515 10:43:49.255183 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-var-run-calico\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.255573 kubelet[2102]: I0515 10:43:49.255561 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/41ddcf48-157b-4c90-b249-ba59f277cd7e-node-certs\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.255652 kubelet[2102]: I0515 10:43:49.255643 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-var-lib-calico\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.255740 kubelet[2102]: I0515 10:43:49.255732 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-cni-bin-dir\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.255809 kubelet[2102]: I0515 10:43:49.255799 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7xzq2\" (UniqueName: \"kubernetes.io/projected/41ddcf48-157b-4c90-b249-ba59f277cd7e-kube-api-access-7xzq2\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.255885 kubelet[2102]: I0515 10:43:49.255877 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-xtables-lock\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.255951 kubelet[2102]: I0515 10:43:49.255944 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/41ddcf48-157b-4c90-b249-ba59f277cd7e-tigera-ca-bundle\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.256021 kubelet[2102]: I0515 10:43:49.256011 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b0557d90-fa0e-4f2e-a3f1-8d3ee678c8e0-tigera-ca-bundle\") pod \"calico-typha-5f85f76d8b-hf7pm\" (UID: \"b0557d90-fa0e-4f2e-a3f1-8d3ee678c8e0\") " pod="calico-system/calico-typha-5f85f76d8b-hf7pm" May 15 10:43:49.256097 kubelet[2102]: I0515 10:43:49.256089 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-znlkk\" (UniqueName: \"kubernetes.io/projected/b0557d90-fa0e-4f2e-a3f1-8d3ee678c8e0-kube-api-access-znlkk\") pod \"calico-typha-5f85f76d8b-hf7pm\" (UID: \"b0557d90-fa0e-4f2e-a3f1-8d3ee678c8e0\") " pod="calico-system/calico-typha-5f85f76d8b-hf7pm" May 15 10:43:49.256166 kubelet[2102]: I0515 10:43:49.256153 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-flexvol-driver-host\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.256249 kubelet[2102]: I0515 10:43:49.256241 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-cni-log-dir\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.256338 kubelet[2102]: I0515 10:43:49.256331 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-cni-net-dir\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.256414 kubelet[2102]: I0515 10:43:49.256407 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-policysync\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.256482 kubelet[2102]: I0515 10:43:49.256474 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b0557d90-fa0e-4f2e-a3f1-8d3ee678c8e0-typha-certs\") pod \"calico-typha-5f85f76d8b-hf7pm\" (UID: \"b0557d90-fa0e-4f2e-a3f1-8d3ee678c8e0\") " pod="calico-system/calico-typha-5f85f76d8b-hf7pm" May 15 10:43:49.256542 kubelet[2102]: I0515 10:43:49.256535 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/41ddcf48-157b-4c90-b249-ba59f277cd7e-lib-modules\") pod \"calico-node-wctxg\" (UID: \"41ddcf48-157b-4c90-b249-ba59f277cd7e\") " pod="calico-system/calico-node-wctxg" May 15 10:43:49.295833 kubelet[2102]: E0515 10:43:49.295805 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bttzv" podUID="8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8" May 15 10:43:49.357378 kubelet[2102]: I0515 10:43:49.357348 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8-kubelet-dir\") pod \"csi-node-driver-bttzv\" (UID: \"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8\") " pod="calico-system/csi-node-driver-bttzv" May 15 10:43:49.357477 kubelet[2102]: I0515 10:43:49.357427 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8-varrun\") pod \"csi-node-driver-bttzv\" (UID: \"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8\") " pod="calico-system/csi-node-driver-bttzv" May 15 10:43:49.357477 kubelet[2102]: I0515 10:43:49.357441 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8-registration-dir\") pod \"csi-node-driver-bttzv\" (UID: \"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8\") " pod="calico-system/csi-node-driver-bttzv" May 15 10:43:49.357477 kubelet[2102]: I0515 10:43:49.357465 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h8l8g\" (UniqueName: \"kubernetes.io/projected/8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8-kube-api-access-h8l8g\") pod \"csi-node-driver-bttzv\" (UID: \"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8\") " pod="calico-system/csi-node-driver-bttzv" May 15 10:43:49.357548 kubelet[2102]: I0515 10:43:49.357484 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8-socket-dir\") pod \"csi-node-driver-bttzv\" (UID: \"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8\") " pod="calico-system/csi-node-driver-bttzv" May 15 10:43:49.369630 kubelet[2102]: E0515 10:43:49.369613 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.369762 kubelet[2102]: W0515 10:43:49.369748 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.369833 kubelet[2102]: E0515 10:43:49.369821 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.372287 kubelet[2102]: E0515 10:43:49.372266 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.372401 kubelet[2102]: W0515 10:43:49.372385 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.372583 kubelet[2102]: E0515 10:43:49.372575 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.372634 kubelet[2102]: W0515 10:43:49.372624 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.372690 kubelet[2102]: E0515 10:43:49.372680 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.372754 kubelet[2102]: E0515 10:43:49.372744 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.372877 kubelet[2102]: E0515 10:43:49.372870 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.372925 kubelet[2102]: W0515 10:43:49.372916 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.372980 kubelet[2102]: E0515 10:43:49.372972 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.373193 kubelet[2102]: E0515 10:43:49.373185 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.373252 kubelet[2102]: W0515 10:43:49.373243 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.373317 kubelet[2102]: E0515 10:43:49.373307 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.382872 kubelet[2102]: E0515 10:43:49.382854 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.382981 kubelet[2102]: W0515 10:43:49.382967 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.383067 kubelet[2102]: E0515 10:43:49.383056 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.384409 kubelet[2102]: E0515 10:43:49.383395 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.384409 kubelet[2102]: W0515 10:43:49.383408 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.384409 kubelet[2102]: E0515 10:43:49.383418 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.457849 kubelet[2102]: E0515 10:43:49.457785 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.457849 kubelet[2102]: W0515 10:43:49.457799 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.457849 kubelet[2102]: E0515 10:43:49.457812 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.458871 kubelet[2102]: E0515 10:43:49.458838 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.458914 kubelet[2102]: W0515 10:43:49.458873 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.458914 kubelet[2102]: E0515 10:43:49.458886 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.459046 kubelet[2102]: E0515 10:43:49.459035 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.459046 kubelet[2102]: W0515 10:43:49.459043 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.459196 kubelet[2102]: E0515 10:43:49.459049 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.459196 kubelet[2102]: E0515 10:43:49.459141 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.459196 kubelet[2102]: W0515 10:43:49.459146 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.459196 kubelet[2102]: E0515 10:43:49.459151 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.459310 kubelet[2102]: E0515 10:43:49.459238 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.459310 kubelet[2102]: W0515 10:43:49.459243 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.459310 kubelet[2102]: E0515 10:43:49.459247 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.459475 kubelet[2102]: E0515 10:43:49.459463 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.459475 kubelet[2102]: W0515 10:43:49.459473 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.459537 kubelet[2102]: E0515 10:43:49.459482 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.459654 kubelet[2102]: E0515 10:43:49.459635 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.459654 kubelet[2102]: W0515 10:43:49.459642 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.459654 kubelet[2102]: E0515 10:43:49.459650 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.459831 kubelet[2102]: E0515 10:43:49.459821 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.459831 kubelet[2102]: W0515 10:43:49.459829 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.459897 kubelet[2102]: E0515 10:43:49.459872 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.460044 kubelet[2102]: E0515 10:43:49.460017 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.460044 kubelet[2102]: W0515 10:43:49.460034 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.460106 kubelet[2102]: E0515 10:43:49.460083 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.460148 kubelet[2102]: E0515 10:43:49.460139 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.460148 kubelet[2102]: W0515 10:43:49.460146 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.460204 kubelet[2102]: E0515 10:43:49.460188 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.460325 kubelet[2102]: E0515 10:43:49.460315 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.460363 kubelet[2102]: W0515 10:43:49.460325 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.460363 kubelet[2102]: E0515 10:43:49.460334 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.460473 kubelet[2102]: E0515 10:43:49.460464 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.460473 kubelet[2102]: W0515 10:43:49.460471 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.460556 kubelet[2102]: E0515 10:43:49.460545 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.460664 kubelet[2102]: E0515 10:43:49.460651 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.460664 kubelet[2102]: W0515 10:43:49.460658 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.460727 kubelet[2102]: E0515 10:43:49.460715 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.460821 kubelet[2102]: E0515 10:43:49.460811 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.460821 kubelet[2102]: W0515 10:43:49.460818 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.460892 kubelet[2102]: E0515 10:43:49.460827 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.461001 kubelet[2102]: E0515 10:43:49.460978 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.461001 kubelet[2102]: W0515 10:43:49.460986 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.461001 kubelet[2102]: E0515 10:43:49.460994 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.461165 kubelet[2102]: E0515 10:43:49.461155 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.461165 kubelet[2102]: W0515 10:43:49.461162 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.461165 kubelet[2102]: E0515 10:43:49.461170 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.461311 kubelet[2102]: E0515 10:43:49.461299 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.461311 kubelet[2102]: W0515 10:43:49.461309 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.461371 kubelet[2102]: E0515 10:43:49.461316 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.461400 kubelet[2102]: E0515 10:43:49.461397 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.461424 kubelet[2102]: W0515 10:43:49.461402 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.461424 kubelet[2102]: E0515 10:43:49.461408 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.461486 kubelet[2102]: E0515 10:43:49.461476 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.461518 kubelet[2102]: W0515 10:43:49.461498 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.461518 kubelet[2102]: E0515 10:43:49.461505 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.461662 kubelet[2102]: E0515 10:43:49.461645 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.461662 kubelet[2102]: W0515 10:43:49.461652 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.461736 kubelet[2102]: E0515 10:43:49.461727 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.461850 kubelet[2102]: E0515 10:43:49.461841 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.461850 kubelet[2102]: W0515 10:43:49.461848 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.461911 kubelet[2102]: E0515 10:43:49.461887 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.462019 kubelet[2102]: E0515 10:43:49.461996 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.462019 kubelet[2102]: W0515 10:43:49.462003 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.462019 kubelet[2102]: E0515 10:43:49.462010 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.462121 kubelet[2102]: E0515 10:43:49.462117 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.462121 kubelet[2102]: W0515 10:43:49.462121 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.462173 kubelet[2102]: E0515 10:43:49.462126 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.462274 kubelet[2102]: E0515 10:43:49.462212 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.462274 kubelet[2102]: W0515 10:43:49.462218 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.462274 kubelet[2102]: E0515 10:43:49.462224 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.462752 kubelet[2102]: E0515 10:43:49.462741 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.462752 kubelet[2102]: W0515 10:43:49.462750 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.462823 kubelet[2102]: E0515 10:43:49.462756 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.472509 kubelet[2102]: E0515 10:43:49.472485 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:49.472509 kubelet[2102]: W0515 10:43:49.472504 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:49.472668 kubelet[2102]: E0515 10:43:49.472517 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:49.485649 env[1269]: time="2025-05-15T10:43:49.485128002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5f85f76d8b-hf7pm,Uid:b0557d90-fa0e-4f2e-a3f1-8d3ee678c8e0,Namespace:calico-system,Attempt:0,}" May 15 10:43:49.495731 env[1269]: time="2025-05-15T10:43:49.495079230Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:43:49.495731 env[1269]: time="2025-05-15T10:43:49.495161923Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:43:49.495731 env[1269]: time="2025-05-15T10:43:49.495180462Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:43:49.496294 env[1269]: time="2025-05-15T10:43:49.495969853Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38c317139597e5efb4fff07f1a6f052f8a508e504f34ca59d37c44430df0ad38 pid=2514 runtime=io.containerd.runc.v2 May 15 10:43:49.506931 systemd[1]: Started cri-containerd-38c317139597e5efb4fff07f1a6f052f8a508e504f34ca59d37c44430df0ad38.scope. May 15 10:43:49.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.523554 kernel: kauditd_printk_skb: 212 callbacks suppressed May 15 10:43:49.523624 kernel: audit: type=1400 audit(1747305829.518:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.523648 kernel: audit: type=1400 audit(1747305829.518:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.528979 kernel: audit: type=1400 audit(1747305829.518:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.529051 kernel: audit: type=1400 audit(1747305829.518:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.535228 kernel: audit: type=1400 audit(1747305829.518:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.535306 kernel: audit: type=1400 audit(1747305829.518:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.535704 env[1269]: time="2025-05-15T10:43:49.535677905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wctxg,Uid:41ddcf48-157b-4c90-b249-ba59f277cd7e,Namespace:calico-system,Attempt:0,}" May 15 10:43:49.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.540278 kernel: audit: type=1400 audit(1747305829.518:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.547082 kernel: audit: type=1400 audit(1747305829.518:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.547205 kernel: audit: type=1400 audit(1747305829.518:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.518000 audit: BPF prog-id=121 op=LOAD May 15 10:43:49.519000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2514 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633331373133393539376535656662346666663037663161366630 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2514 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633331373133393539376535656662346666663037663161366630 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.551052 kernel: audit: type=1400 audit(1747305829.518:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.519000 audit: BPF prog-id=122 op=LOAD May 15 10:43:49.519000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000025a20 items=0 ppid=2514 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633331373133393539376535656662346666663037663161366630 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.525000 audit: BPF prog-id=123 op=LOAD May 15 10:43:49.525000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000025a68 items=0 ppid=2514 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633331373133393539376535656662346666663037663161366630 May 15 10:43:49.537000 audit: BPF prog-id=123 op=UNLOAD May 15 10:43:49.537000 audit: BPF prog-id=122 op=UNLOAD May 15 10:43:49.537000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { perfmon } for pid=2524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit[2524]: AVC avc: denied { bpf } for pid=2524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.537000 audit: BPF prog-id=124 op=LOAD May 15 10:43:49.537000 audit[2524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000025e78 items=0 ppid=2514 pid=2524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633331373133393539376535656662346666663037663161366630 May 15 10:43:49.569321 env[1269]: time="2025-05-15T10:43:49.569285980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5f85f76d8b-hf7pm,Uid:b0557d90-fa0e-4f2e-a3f1-8d3ee678c8e0,Namespace:calico-system,Attempt:0,} returns sandbox id \"38c317139597e5efb4fff07f1a6f052f8a508e504f34ca59d37c44430df0ad38\"" May 15 10:43:49.570255 env[1269]: time="2025-05-15T10:43:49.570236595Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:43:49.594682 env[1269]: time="2025-05-15T10:43:49.594624297Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:43:49.594781 env[1269]: time="2025-05-15T10:43:49.594686136Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:43:49.594781 env[1269]: time="2025-05-15T10:43:49.594718738Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:43:49.594908 env[1269]: time="2025-05-15T10:43:49.594881930Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728 pid=2555 runtime=io.containerd.runc.v2 May 15 10:43:49.609483 systemd[1]: Started cri-containerd-70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728.scope. May 15 10:43:49.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.620000 audit: BPF prog-id=125 op=LOAD May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643161616232303163393330393165396438326438373534383334 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643161616232303163393330393165396438326438373534383334 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit: BPF prog-id=126 op=LOAD May 15 10:43:49.621000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fdd90 items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643161616232303163393330393165396438326438373534383334 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit: BPF prog-id=127 op=LOAD May 15 10:43:49.621000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fddd8 items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643161616232303163393330393165396438326438373534383334 May 15 10:43:49.621000 audit: BPF prog-id=127 op=UNLOAD May 15 10:43:49.621000 audit: BPF prog-id=126 op=UNLOAD May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:49.621000 audit: BPF prog-id=128 op=LOAD May 15 10:43:49.621000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d81e8 items=0 ppid=2555 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643161616232303163393330393165396438326438373534383334 May 15 10:43:49.634445 env[1269]: time="2025-05-15T10:43:49.634415000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wctxg,Uid:41ddcf48-157b-4c90-b249-ba59f277cd7e,Namespace:calico-system,Attempt:0,} returns sandbox id \"70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728\"" May 15 10:43:49.904000 audit[2591]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:49.904000 audit[2591]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcdea9bf50 a2=0 a3=7ffcdea9bf3c items=0 ppid=2232 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.904000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:49.908000 audit[2591]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2591 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:49.908000 audit[2591]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcdea9bf50 a2=0 a3=0 items=0 ppid=2232 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:49.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:50.997397 kubelet[2102]: E0515 10:43:50.996815 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bttzv" podUID="8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8" May 15 10:43:51.637213 env[1269]: time="2025-05-15T10:43:51.637186104Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:51.638269 env[1269]: time="2025-05-15T10:43:51.638254085Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:51.639394 env[1269]: time="2025-05-15T10:43:51.639380686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:51.640370 env[1269]: time="2025-05-15T10:43:51.640356002Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:51.640744 env[1269]: time="2025-05-15T10:43:51.640729703Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 10:43:51.645472 env[1269]: time="2025-05-15T10:43:51.645441295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:43:51.672742 env[1269]: time="2025-05-15T10:43:51.672717354Z" level=info msg="CreateContainer within sandbox \"38c317139597e5efb4fff07f1a6f052f8a508e504f34ca59d37c44430df0ad38\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:43:51.697407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2600373849.mount: Deactivated successfully. May 15 10:43:51.705542 env[1269]: time="2025-05-15T10:43:51.705505849Z" level=info msg="CreateContainer within sandbox \"38c317139597e5efb4fff07f1a6f052f8a508e504f34ca59d37c44430df0ad38\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"18a9286f1d5dc0048687d78489609c01c42291af38ece593d682db8a2fae96d9\"" May 15 10:43:51.706236 env[1269]: time="2025-05-15T10:43:51.706204234Z" level=info msg="StartContainer for \"18a9286f1d5dc0048687d78489609c01c42291af38ece593d682db8a2fae96d9\"" May 15 10:43:51.725985 systemd[1]: Started cri-containerd-18a9286f1d5dc0048687d78489609c01c42291af38ece593d682db8a2fae96d9.scope. May 15 10:43:51.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.739000 audit: BPF prog-id=129 op=LOAD May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2514 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:51.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138613932383666316435646330303438363837643738343839363039 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2514 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:51.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138613932383666316435646330303438363837643738343839363039 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit: BPF prog-id=130 op=LOAD May 15 10:43:51.740000 audit[2601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000231810 items=0 ppid=2514 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:51.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138613932383666316435646330303438363837643738343839363039 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit: BPF prog-id=131 op=LOAD May 15 10:43:51.740000 audit[2601]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000231858 items=0 ppid=2514 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:51.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138613932383666316435646330303438363837643738343839363039 May 15 10:43:51.740000 audit: BPF prog-id=131 op=UNLOAD May 15 10:43:51.740000 audit: BPF prog-id=130 op=UNLOAD May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { perfmon } for pid=2601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit[2601]: AVC avc: denied { bpf } for pid=2601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:51.740000 audit: BPF prog-id=132 op=LOAD May 15 10:43:51.740000 audit[2601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000231c68 items=0 ppid=2514 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:51.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138613932383666316435646330303438363837643738343839363039 May 15 10:43:51.777795 env[1269]: time="2025-05-15T10:43:51.777765600Z" level=info msg="StartContainer for \"18a9286f1d5dc0048687d78489609c01c42291af38ece593d682db8a2fae96d9\" returns successfully" May 15 10:43:52.067174 kubelet[2102]: I0515 10:43:52.067101 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5f85f76d8b-hf7pm" podStartSLOduration=0.991837993 podStartE2EDuration="3.067086107s" podCreationTimestamp="2025-05-15 10:43:49 +0000 UTC" firstStartedPulling="2025-05-15 10:43:49.569950537 +0000 UTC m=+10.744606490" lastFinishedPulling="2025-05-15 10:43:51.645198652 +0000 UTC m=+12.819854604" observedRunningTime="2025-05-15 10:43:52.066132802 +0000 UTC m=+13.240788763" watchObservedRunningTime="2025-05-15 10:43:52.067086107 +0000 UTC m=+13.241742061" May 15 10:43:52.075453 kubelet[2102]: E0515 10:43:52.075425 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.075453 kubelet[2102]: W0515 10:43:52.075449 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.079675 kubelet[2102]: E0515 10:43:52.079647 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.079812 kubelet[2102]: E0515 10:43:52.079799 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.079847 kubelet[2102]: W0515 10:43:52.079810 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.079847 kubelet[2102]: E0515 10:43:52.079826 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.079915 kubelet[2102]: E0515 10:43:52.079906 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.079915 kubelet[2102]: W0515 10:43:52.079912 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.079969 kubelet[2102]: E0515 10:43:52.079918 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.080060 kubelet[2102]: E0515 10:43:52.080051 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.080060 kubelet[2102]: W0515 10:43:52.080058 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.080118 kubelet[2102]: E0515 10:43:52.080065 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.080168 kubelet[2102]: E0515 10:43:52.080160 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.080168 kubelet[2102]: W0515 10:43:52.080166 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.080219 kubelet[2102]: E0515 10:43:52.080172 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.080327 kubelet[2102]: E0515 10:43:52.080317 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.080327 kubelet[2102]: W0515 10:43:52.080323 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.080388 kubelet[2102]: E0515 10:43:52.080329 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.080418 kubelet[2102]: E0515 10:43:52.080408 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.080418 kubelet[2102]: W0515 10:43:52.080414 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.080468 kubelet[2102]: E0515 10:43:52.080419 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.080737 kubelet[2102]: E0515 10:43:52.080726 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.080737 kubelet[2102]: W0515 10:43:52.080734 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.080796 kubelet[2102]: E0515 10:43:52.080740 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.080850 kubelet[2102]: E0515 10:43:52.080841 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.080850 kubelet[2102]: W0515 10:43:52.080848 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.080905 kubelet[2102]: E0515 10:43:52.080852 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.081016 kubelet[2102]: E0515 10:43:52.081006 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.081016 kubelet[2102]: W0515 10:43:52.081013 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.081088 kubelet[2102]: E0515 10:43:52.081020 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.081125 kubelet[2102]: E0515 10:43:52.081116 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.081125 kubelet[2102]: W0515 10:43:52.081123 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.081181 kubelet[2102]: E0515 10:43:52.081128 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.081279 kubelet[2102]: E0515 10:43:52.081269 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.081279 kubelet[2102]: W0515 10:43:52.081276 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.081386 kubelet[2102]: E0515 10:43:52.081281 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.081386 kubelet[2102]: E0515 10:43:52.081370 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.081386 kubelet[2102]: W0515 10:43:52.081375 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.081458 kubelet[2102]: E0515 10:43:52.081387 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.081509 kubelet[2102]: E0515 10:43:52.081500 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.081509 kubelet[2102]: W0515 10:43:52.081506 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.081557 kubelet[2102]: E0515 10:43:52.081511 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.081838 kubelet[2102]: E0515 10:43:52.081814 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.081838 kubelet[2102]: W0515 10:43:52.081822 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.081908 kubelet[2102]: E0515 10:43:52.081874 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.082004 kubelet[2102]: E0515 10:43:52.081993 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.082004 kubelet[2102]: W0515 10:43:52.082000 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.082004 kubelet[2102]: E0515 10:43:52.082005 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.082109 kubelet[2102]: E0515 10:43:52.082099 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.082109 kubelet[2102]: W0515 10:43:52.082106 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.082162 kubelet[2102]: E0515 10:43:52.082111 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.083112 kubelet[2102]: E0515 10:43:52.083104 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.083168 kubelet[2102]: W0515 10:43:52.083159 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.083219 kubelet[2102]: E0515 10:43:52.083210 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.083346 kubelet[2102]: E0515 10:43:52.083333 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.083346 kubelet[2102]: W0515 10:43:52.083342 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.083421 kubelet[2102]: E0515 10:43:52.083352 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.083446 kubelet[2102]: E0515 10:43:52.083432 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.083446 kubelet[2102]: W0515 10:43:52.083437 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.083446 kubelet[2102]: E0515 10:43:52.083442 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.083543 kubelet[2102]: E0515 10:43:52.083533 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.083543 kubelet[2102]: W0515 10:43:52.083539 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.083603 kubelet[2102]: E0515 10:43:52.083544 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.083642 kubelet[2102]: E0515 10:43:52.083632 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.083642 kubelet[2102]: W0515 10:43:52.083638 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.083721 kubelet[2102]: E0515 10:43:52.083709 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.083721 kubelet[2102]: W0515 10:43:52.083716 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.083785 kubelet[2102]: E0515 10:43:52.083707 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.083899 kubelet[2102]: E0515 10:43:52.083786 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.083899 kubelet[2102]: W0515 10:43:52.083898 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.083950 kubelet[2102]: E0515 10:43:52.083905 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.083990 kubelet[2102]: E0515 10:43:52.083981 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.083990 kubelet[2102]: W0515 10:43:52.083987 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.084049 kubelet[2102]: E0515 10:43:52.083992 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.084092 kubelet[2102]: E0515 10:43:52.084083 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.084092 kubelet[2102]: W0515 10:43:52.084089 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.084147 kubelet[2102]: E0515 10:43:52.084094 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.084187 kubelet[2102]: E0515 10:43:52.084177 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.084187 kubelet[2102]: W0515 10:43:52.084185 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.084245 kubelet[2102]: E0515 10:43:52.084191 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.084351 kubelet[2102]: E0515 10:43:52.084341 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.084351 kubelet[2102]: W0515 10:43:52.084348 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.084404 kubelet[2102]: E0515 10:43:52.084353 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.084404 kubelet[2102]: E0515 10:43:52.083789 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.084454 kubelet[2102]: E0515 10:43:52.084431 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.084454 kubelet[2102]: W0515 10:43:52.084435 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.084454 kubelet[2102]: E0515 10:43:52.084440 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.084517 kubelet[2102]: E0515 10:43:52.084504 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.084517 kubelet[2102]: W0515 10:43:52.084508 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.084517 kubelet[2102]: E0515 10:43:52.084513 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.084598 kubelet[2102]: E0515 10:43:52.084588 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.084598 kubelet[2102]: W0515 10:43:52.084595 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.084650 kubelet[2102]: E0515 10:43:52.084599 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.086295 kubelet[2102]: E0515 10:43:52.084749 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.086295 kubelet[2102]: W0515 10:43:52.084755 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.086295 kubelet[2102]: E0515 10:43:52.084763 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.086295 kubelet[2102]: E0515 10:43:52.084837 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:52.086295 kubelet[2102]: W0515 10:43:52.084842 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:52.086295 kubelet[2102]: E0515 10:43:52.084847 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:52.089000 audit[2665]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:52.089000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc607d18f0 a2=0 a3=7ffc607d18dc items=0 ppid=2232 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:52.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:52.093000 audit[2665]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:43:52.093000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc607d18f0 a2=0 a3=7ffc607d18dc items=0 ppid=2232 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:52.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:43:52.997252 kubelet[2102]: E0515 10:43:52.997225 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bttzv" podUID="8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8" May 15 10:43:53.087363 kubelet[2102]: E0515 10:43:53.087343 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.087639 kubelet[2102]: W0515 10:43:53.087625 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.087706 kubelet[2102]: E0515 10:43:53.087695 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.087884 kubelet[2102]: E0515 10:43:53.087877 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.087942 kubelet[2102]: W0515 10:43:53.087932 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.087998 kubelet[2102]: E0515 10:43:53.087988 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.088183 kubelet[2102]: E0515 10:43:53.088176 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.088240 kubelet[2102]: W0515 10:43:53.088231 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.088302 kubelet[2102]: E0515 10:43:53.088293 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.088487 kubelet[2102]: E0515 10:43:53.088480 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.088543 kubelet[2102]: W0515 10:43:53.088533 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.088595 kubelet[2102]: E0515 10:43:53.088586 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.088757 kubelet[2102]: E0515 10:43:53.088750 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.088815 kubelet[2102]: W0515 10:43:53.088806 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.088868 kubelet[2102]: E0515 10:43:53.088859 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.089019 kubelet[2102]: E0515 10:43:53.089012 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.089084 kubelet[2102]: W0515 10:43:53.089074 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.089141 kubelet[2102]: E0515 10:43:53.089132 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.089294 kubelet[2102]: E0515 10:43:53.089288 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.089352 kubelet[2102]: W0515 10:43:53.089342 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.089408 kubelet[2102]: E0515 10:43:53.089399 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.089559 kubelet[2102]: E0515 10:43:53.089553 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.089610 kubelet[2102]: W0515 10:43:53.089601 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.089667 kubelet[2102]: E0515 10:43:53.089657 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.089840 kubelet[2102]: E0515 10:43:53.089833 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.089895 kubelet[2102]: W0515 10:43:53.089885 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.089947 kubelet[2102]: E0515 10:43:53.089938 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.090118 kubelet[2102]: E0515 10:43:53.090111 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.090173 kubelet[2102]: W0515 10:43:53.090164 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.090230 kubelet[2102]: E0515 10:43:53.090220 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.090387 kubelet[2102]: E0515 10:43:53.090380 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.090443 kubelet[2102]: W0515 10:43:53.090433 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.090498 kubelet[2102]: E0515 10:43:53.090488 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.090797 kubelet[2102]: E0515 10:43:53.090790 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.090906 kubelet[2102]: W0515 10:43:53.090895 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.090964 kubelet[2102]: E0515 10:43:53.090955 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.091185 kubelet[2102]: E0515 10:43:53.091178 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.091244 kubelet[2102]: W0515 10:43:53.091234 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.091305 kubelet[2102]: E0515 10:43:53.091296 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.091455 kubelet[2102]: E0515 10:43:53.091448 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.091510 kubelet[2102]: W0515 10:43:53.091501 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.091563 kubelet[2102]: E0515 10:43:53.091554 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.091711 kubelet[2102]: E0515 10:43:53.091704 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.091763 kubelet[2102]: W0515 10:43:53.091753 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.091819 kubelet[2102]: E0515 10:43:53.091810 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.092044 kubelet[2102]: E0515 10:43:53.092019 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.092098 kubelet[2102]: W0515 10:43:53.092088 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.092156 kubelet[2102]: E0515 10:43:53.092147 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.092329 kubelet[2102]: E0515 10:43:53.092322 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.092383 kubelet[2102]: W0515 10:43:53.092373 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.092442 kubelet[2102]: E0515 10:43:53.092433 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.092607 kubelet[2102]: E0515 10:43:53.092599 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.092661 kubelet[2102]: W0515 10:43:53.092651 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.092718 kubelet[2102]: E0515 10:43:53.092708 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.092879 kubelet[2102]: E0515 10:43:53.092871 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.092930 kubelet[2102]: W0515 10:43:53.092921 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.092990 kubelet[2102]: E0515 10:43:53.092980 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.093185 kubelet[2102]: E0515 10:43:53.093177 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.093240 kubelet[2102]: W0515 10:43:53.093231 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.093293 kubelet[2102]: E0515 10:43:53.093284 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.093464 kubelet[2102]: E0515 10:43:53.093455 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.093545 kubelet[2102]: W0515 10:43:53.093506 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.093604 kubelet[2102]: E0515 10:43:53.093594 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.093928 kubelet[2102]: E0515 10:43:53.093921 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.093981 kubelet[2102]: W0515 10:43:53.093971 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.094100 kubelet[2102]: E0515 10:43:53.094092 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.094204 kubelet[2102]: E0515 10:43:53.094176 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.094265 kubelet[2102]: W0515 10:43:53.094255 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.094406 kubelet[2102]: E0515 10:43:53.094387 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.094502 kubelet[2102]: E0515 10:43:53.094495 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.094556 kubelet[2102]: W0515 10:43:53.094547 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.094615 kubelet[2102]: E0515 10:43:53.094606 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.094763 kubelet[2102]: E0515 10:43:53.094756 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.094818 kubelet[2102]: W0515 10:43:53.094808 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.094882 kubelet[2102]: E0515 10:43:53.094874 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.095073 kubelet[2102]: E0515 10:43:53.095066 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.095130 kubelet[2102]: W0515 10:43:53.095120 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.095188 kubelet[2102]: E0515 10:43:53.095179 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.095337 kubelet[2102]: E0515 10:43:53.095329 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.095388 kubelet[2102]: W0515 10:43:53.095379 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.095446 kubelet[2102]: E0515 10:43:53.095437 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.095606 kubelet[2102]: E0515 10:43:53.095599 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.095660 kubelet[2102]: W0515 10:43:53.095650 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.095715 kubelet[2102]: E0515 10:43:53.095706 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.095971 kubelet[2102]: E0515 10:43:53.095963 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.096023 kubelet[2102]: W0515 10:43:53.096013 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.096117 kubelet[2102]: E0515 10:43:53.096106 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.096276 kubelet[2102]: E0515 10:43:53.096269 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.096332 kubelet[2102]: W0515 10:43:53.096322 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.096387 kubelet[2102]: E0515 10:43:53.096378 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.096559 kubelet[2102]: E0515 10:43:53.096552 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.096605 kubelet[2102]: W0515 10:43:53.096596 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.096657 kubelet[2102]: E0515 10:43:53.096649 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.096805 kubelet[2102]: E0515 10:43:53.096799 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.096855 kubelet[2102]: W0515 10:43:53.096846 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.096905 kubelet[2102]: E0515 10:43:53.096896 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.097140 kubelet[2102]: E0515 10:43:53.097133 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:43:53.097194 kubelet[2102]: W0515 10:43:53.097185 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:43:53.097245 kubelet[2102]: E0515 10:43:53.097236 2102 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:43:53.330813 env[1269]: time="2025-05-15T10:43:53.328915124Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:53.331660 env[1269]: time="2025-05-15T10:43:53.331639683Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:53.332385 env[1269]: time="2025-05-15T10:43:53.332368382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:53.333271 env[1269]: time="2025-05-15T10:43:53.333257421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:53.334017 env[1269]: time="2025-05-15T10:43:53.333993554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 10:43:53.335862 env[1269]: time="2025-05-15T10:43:53.335844784Z" level=info msg="CreateContainer within sandbox \"70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:43:53.343506 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount54419861.mount: Deactivated successfully. May 15 10:43:53.346543 env[1269]: time="2025-05-15T10:43:53.346512019Z" level=info msg="CreateContainer within sandbox \"70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7\"" May 15 10:43:53.347009 env[1269]: time="2025-05-15T10:43:53.346996293Z" level=info msg="StartContainer for \"b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7\"" May 15 10:43:53.360253 systemd[1]: Started cri-containerd-b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7.scope. May 15 10:43:53.374000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f85385559d8 items=0 ppid=2555 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:53.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626433363139653538343762653632373835653330333237303337 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.374000 audit: BPF prog-id=133 op=LOAD May 15 10:43:53.374000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00027bc58 items=0 ppid=2555 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:53.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626433363139653538343762653632373835653330333237303337 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit: BPF prog-id=134 op=LOAD May 15 10:43:53.375000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00027bca8 items=0 ppid=2555 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:53.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626433363139653538343762653632373835653330333237303337 May 15 10:43:53.375000 audit: BPF prog-id=134 op=UNLOAD May 15 10:43:53.375000 audit: BPF prog-id=133 op=UNLOAD May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { perfmon } for pid=2707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:53.375000 audit: BPF prog-id=135 op=LOAD May 15 10:43:53.375000 audit[2707]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00027bd38 items=0 ppid=2555 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:53.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239626433363139653538343762653632373835653330333237303337 May 15 10:43:53.400931 env[1269]: time="2025-05-15T10:43:53.400905991Z" level=info msg="StartContainer for \"b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7\" returns successfully" May 15 10:43:53.405141 systemd[1]: cri-containerd-b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7.scope: Deactivated successfully. May 15 10:43:53.407000 audit: BPF prog-id=135 op=UNLOAD May 15 10:43:53.664118 systemd[1]: run-containerd-runc-k8s.io-b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7-runc.JqydqQ.mount: Deactivated successfully. May 15 10:43:53.664198 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7-rootfs.mount: Deactivated successfully. May 15 10:43:53.810500 env[1269]: time="2025-05-15T10:43:53.810457646Z" level=info msg="shim disconnected" id=b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7 May 15 10:43:53.810849 env[1269]: time="2025-05-15T10:43:53.810831313Z" level=warning msg="cleaning up after shim disconnected" id=b9bd3619e5847be62785e30327037ee14df71b6e8251151c4b0081f8e215b4d7 namespace=k8s.io May 15 10:43:53.810943 env[1269]: time="2025-05-15T10:43:53.810928744Z" level=info msg="cleaning up dead shim" May 15 10:43:53.817356 env[1269]: time="2025-05-15T10:43:53.817331638Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:43:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2746 runtime=io.containerd.runc.v2\n" May 15 10:43:54.067264 env[1269]: time="2025-05-15T10:43:54.067194102Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:43:54.998317 kubelet[2102]: E0515 10:43:54.997606 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bttzv" podUID="8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8" May 15 10:43:56.999952 kubelet[2102]: E0515 10:43:56.999135 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bttzv" podUID="8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8" May 15 10:43:58.176916 env[1269]: time="2025-05-15T10:43:58.176890678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:58.179494 env[1269]: time="2025-05-15T10:43:58.179477747Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:58.180448 env[1269]: time="2025-05-15T10:43:58.180431018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:58.181303 env[1269]: time="2025-05-15T10:43:58.181286026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:43:58.181690 env[1269]: time="2025-05-15T10:43:58.181670966Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 10:43:58.183371 env[1269]: time="2025-05-15T10:43:58.183351047Z" level=info msg="CreateContainer within sandbox \"70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:43:58.189607 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3784399331.mount: Deactivated successfully. May 15 10:43:58.191855 env[1269]: time="2025-05-15T10:43:58.191831177Z" level=info msg="CreateContainer within sandbox \"70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"03c7c37831296ded8a9c529c0b1a3635b31595948e1807998dff5c9f338a09d4\"" May 15 10:43:58.192361 env[1269]: time="2025-05-15T10:43:58.192345109Z" level=info msg="StartContainer for \"03c7c37831296ded8a9c529c0b1a3635b31595948e1807998dff5c9f338a09d4\"" May 15 10:43:58.215899 systemd[1]: Started cri-containerd-03c7c37831296ded8a9c529c0b1a3635b31595948e1807998dff5c9f338a09d4.scope. May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.265287 kernel: kauditd_printk_skb: 217 callbacks suppressed May 15 10:43:58.265341 kernel: audit: type=1400 audit(1747305838.260:1010): avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb2004b34d8 items=0 ppid=2555 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:58.271446 kernel: audit: type=1300 audit(1747305838.260:1010): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb2004b34d8 items=0 ppid=2555 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:58.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633763333738333132393664656438613963353239633062316133 May 15 10:43:58.278070 kernel: audit: type=1327 audit(1747305838.260:1010): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633763333738333132393664656438613963353239633062316133 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.283796 kernel: audit: type=1400 audit(1747305838.260:1011): avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.283835 kernel: audit: type=1400 audit(1747305838.260:1011): avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.292162 kernel: audit: type=1400 audit(1747305838.260:1011): avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.292212 kernel: audit: type=1400 audit(1747305838.260:1011): avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.292231 kernel: audit: type=1400 audit(1747305838.260:1011): avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.294745 env[1269]: time="2025-05-15T10:43:58.294720022Z" level=info msg="StartContainer for \"03c7c37831296ded8a9c529c0b1a3635b31595948e1807998dff5c9f338a09d4\" returns successfully" May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.300008 kernel: audit: type=1400 audit(1747305838.260:1011): avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.300055 kernel: audit: type=1400 audit(1747305838.260:1011): avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit: BPF prog-id=136 op=LOAD May 15 10:43:58.260000 audit[2772]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000298948 items=0 ppid=2555 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:58.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633763333738333132393664656438613963353239633062316133 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit: BPF prog-id=137 op=LOAD May 15 10:43:58.260000 audit[2772]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000298998 items=0 ppid=2555 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:58.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633763333738333132393664656438613963353239633062316133 May 15 10:43:58.260000 audit: BPF prog-id=137 op=UNLOAD May 15 10:43:58.260000 audit: BPF prog-id=136 op=UNLOAD May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:43:58.260000 audit: BPF prog-id=138 op=LOAD May 15 10:43:58.260000 audit[2772]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000298a28 items=0 ppid=2555 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:43:58.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633763333738333132393664656438613963353239633062316133 May 15 10:43:58.998304 kubelet[2102]: E0515 10:43:58.998282 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bttzv" podUID="8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8" May 15 10:43:59.911804 env[1269]: time="2025-05-15T10:43:59.911754298Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:43:59.915171 systemd[1]: cri-containerd-03c7c37831296ded8a9c529c0b1a3635b31595948e1807998dff5c9f338a09d4.scope: Deactivated successfully. May 15 10:43:59.919000 audit: BPF prog-id=138 op=UNLOAD May 15 10:43:59.930360 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-03c7c37831296ded8a9c529c0b1a3635b31595948e1807998dff5c9f338a09d4-rootfs.mount: Deactivated successfully. May 15 10:44:00.009017 kubelet[2102]: I0515 10:43:59.999394 2102 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 15 10:44:00.095875 env[1269]: time="2025-05-15T10:44:00.095843318Z" level=info msg="shim disconnected" id=03c7c37831296ded8a9c529c0b1a3635b31595948e1807998dff5c9f338a09d4 May 15 10:44:00.095875 env[1269]: time="2025-05-15T10:44:00.095872283Z" level=warning msg="cleaning up after shim disconnected" id=03c7c37831296ded8a9c529c0b1a3635b31595948e1807998dff5c9f338a09d4 namespace=k8s.io May 15 10:44:00.095875 env[1269]: time="2025-05-15T10:44:00.095879304Z" level=info msg="cleaning up dead shim" May 15 10:44:00.101134 env[1269]: time="2025-05-15T10:44:00.101098625Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:44:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2810 runtime=io.containerd.runc.v2\n" May 15 10:44:00.140817 kubelet[2102]: I0515 10:44:00.140793 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vvlzn\" (UniqueName: \"kubernetes.io/projected/4877dea9-5148-4e17-852e-f380a1e02cd0-kube-api-access-vvlzn\") pod \"calico-apiserver-d49d8bdc-n8crk\" (UID: \"4877dea9-5148-4e17-852e-f380a1e02cd0\") " pod="calico-apiserver/calico-apiserver-d49d8bdc-n8crk" May 15 10:44:00.143632 kubelet[2102]: I0515 10:44:00.143614 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d6nvh\" (UniqueName: \"kubernetes.io/projected/b67a3be5-f48f-469c-afaa-fe33556ead05-kube-api-access-d6nvh\") pod \"coredns-668d6bf9bc-qznsj\" (UID: \"b67a3be5-f48f-469c-afaa-fe33556ead05\") " pod="kube-system/coredns-668d6bf9bc-qznsj" May 15 10:44:00.143917 kubelet[2102]: I0515 10:44:00.143906 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/07ce99d3-3b9a-4a97-be21-c81199d9e00b-tigera-ca-bundle\") pod \"calico-kube-controllers-956fd76b-r2swt\" (UID: \"07ce99d3-3b9a-4a97-be21-c81199d9e00b\") " pod="calico-system/calico-kube-controllers-956fd76b-r2swt" May 15 10:44:00.144001 kubelet[2102]: I0515 10:44:00.143984 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b67a3be5-f48f-469c-afaa-fe33556ead05-config-volume\") pod \"coredns-668d6bf9bc-qznsj\" (UID: \"b67a3be5-f48f-469c-afaa-fe33556ead05\") " pod="kube-system/coredns-668d6bf9bc-qznsj" May 15 10:44:00.144071 kubelet[2102]: I0515 10:44:00.144060 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vqzzz\" (UniqueName: \"kubernetes.io/projected/07ce99d3-3b9a-4a97-be21-c81199d9e00b-kube-api-access-vqzzz\") pod \"calico-kube-controllers-956fd76b-r2swt\" (UID: \"07ce99d3-3b9a-4a97-be21-c81199d9e00b\") " pod="calico-system/calico-kube-controllers-956fd76b-r2swt" May 15 10:44:00.144141 kubelet[2102]: I0515 10:44:00.144132 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c7dc7561-18b0-4ced-b105-6e410668e1a9-calico-apiserver-certs\") pod \"calico-apiserver-d49d8bdc-pcch5\" (UID: \"c7dc7561-18b0-4ced-b105-6e410668e1a9\") " pod="calico-apiserver/calico-apiserver-d49d8bdc-pcch5" May 15 10:44:00.144200 kubelet[2102]: I0515 10:44:00.144191 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h67b7\" (UniqueName: \"kubernetes.io/projected/c76e5f8c-48a4-445b-9d75-a7928050f62f-kube-api-access-h67b7\") pod \"coredns-668d6bf9bc-j2jp6\" (UID: \"c76e5f8c-48a4-445b-9d75-a7928050f62f\") " pod="kube-system/coredns-668d6bf9bc-j2jp6" May 15 10:44:00.144282 kubelet[2102]: I0515 10:44:00.144273 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hg9md\" (UniqueName: \"kubernetes.io/projected/c7dc7561-18b0-4ced-b105-6e410668e1a9-kube-api-access-hg9md\") pod \"calico-apiserver-d49d8bdc-pcch5\" (UID: \"c7dc7561-18b0-4ced-b105-6e410668e1a9\") " pod="calico-apiserver/calico-apiserver-d49d8bdc-pcch5" May 15 10:44:00.144338 kubelet[2102]: I0515 10:44:00.144329 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4877dea9-5148-4e17-852e-f380a1e02cd0-calico-apiserver-certs\") pod \"calico-apiserver-d49d8bdc-n8crk\" (UID: \"4877dea9-5148-4e17-852e-f380a1e02cd0\") " pod="calico-apiserver/calico-apiserver-d49d8bdc-n8crk" May 15 10:44:00.144402 kubelet[2102]: I0515 10:44:00.144391 2102 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c76e5f8c-48a4-445b-9d75-a7928050f62f-config-volume\") pod \"coredns-668d6bf9bc-j2jp6\" (UID: \"c76e5f8c-48a4-445b-9d75-a7928050f62f\") " pod="kube-system/coredns-668d6bf9bc-j2jp6" May 15 10:44:00.149194 systemd[1]: Created slice kubepods-besteffort-podc7dc7561_18b0_4ced_b105_6e410668e1a9.slice. May 15 10:44:00.153870 systemd[1]: Created slice kubepods-burstable-podc76e5f8c_48a4_445b_9d75_a7928050f62f.slice. May 15 10:44:00.160679 systemd[1]: Created slice kubepods-besteffort-pod4877dea9_5148_4e17_852e_f380a1e02cd0.slice. May 15 10:44:00.166306 systemd[1]: Created slice kubepods-burstable-podb67a3be5_f48f_469c_afaa_fe33556ead05.slice. May 15 10:44:00.171894 systemd[1]: Created slice kubepods-besteffort-pod07ce99d3_3b9a_4a97_be21_c81199d9e00b.slice. May 15 10:44:00.456593 env[1269]: time="2025-05-15T10:44:00.455749253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49d8bdc-pcch5,Uid:c7dc7561-18b0-4ced-b105-6e410668e1a9,Namespace:calico-apiserver,Attempt:0,}" May 15 10:44:00.457589 env[1269]: time="2025-05-15T10:44:00.457140425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-j2jp6,Uid:c76e5f8c-48a4-445b-9d75-a7928050f62f,Namespace:kube-system,Attempt:0,}" May 15 10:44:00.466653 env[1269]: time="2025-05-15T10:44:00.466624199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49d8bdc-n8crk,Uid:4877dea9-5148-4e17-852e-f380a1e02cd0,Namespace:calico-apiserver,Attempt:0,}" May 15 10:44:00.471000 env[1269]: time="2025-05-15T10:44:00.470976371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qznsj,Uid:b67a3be5-f48f-469c-afaa-fe33556ead05,Namespace:kube-system,Attempt:0,}" May 15 10:44:00.473933 env[1269]: time="2025-05-15T10:44:00.473884917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-956fd76b-r2swt,Uid:07ce99d3-3b9a-4a97-be21-c81199d9e00b,Namespace:calico-system,Attempt:0,}" May 15 10:44:00.780447 env[1269]: time="2025-05-15T10:44:00.780339823Z" level=error msg="Failed to destroy network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.780888 env[1269]: time="2025-05-15T10:44:00.780870988Z" level=error msg="encountered an error cleaning up failed sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.780976 env[1269]: time="2025-05-15T10:44:00.780959223Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-j2jp6,Uid:c76e5f8c-48a4-445b-9d75-a7928050f62f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.782095 env[1269]: time="2025-05-15T10:44:00.782068133Z" level=error msg="Failed to destroy network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.782536 env[1269]: time="2025-05-15T10:44:00.782313515Z" level=error msg="encountered an error cleaning up failed sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.782536 env[1269]: time="2025-05-15T10:44:00.782352679Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49d8bdc-n8crk,Uid:4877dea9-5148-4e17-852e-f380a1e02cd0,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.783942 kubelet[2102]: E0515 10:44:00.783916 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.784124 kubelet[2102]: E0515 10:44:00.783911 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.784159 env[1269]: time="2025-05-15T10:44:00.784044971Z" level=error msg="Failed to destroy network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.784444 kubelet[2102]: E0515 10:44:00.784427 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d49d8bdc-n8crk" May 15 10:44:00.784633 kubelet[2102]: E0515 10:44:00.784452 2102 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d49d8bdc-n8crk" May 15 10:44:00.784633 kubelet[2102]: E0515 10:44:00.784492 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-d49d8bdc-n8crk_calico-apiserver(4877dea9-5148-4e17-852e-f380a1e02cd0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-d49d8bdc-n8crk_calico-apiserver(4877dea9-5148-4e17-852e-f380a1e02cd0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d49d8bdc-n8crk" podUID="4877dea9-5148-4e17-852e-f380a1e02cd0" May 15 10:44:00.784633 kubelet[2102]: E0515 10:44:00.784426 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-j2jp6" May 15 10:44:00.784735 kubelet[2102]: E0515 10:44:00.784521 2102 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-j2jp6" May 15 10:44:00.784735 kubelet[2102]: E0515 10:44:00.784537 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-j2jp6_kube-system(c76e5f8c-48a4-445b-9d75-a7928050f62f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-j2jp6_kube-system(c76e5f8c-48a4-445b-9d75-a7928050f62f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-j2jp6" podUID="c76e5f8c-48a4-445b-9d75-a7928050f62f" May 15 10:44:00.784825 env[1269]: time="2025-05-15T10:44:00.784677849Z" level=error msg="encountered an error cleaning up failed sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.784825 env[1269]: time="2025-05-15T10:44:00.784721021Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-956fd76b-r2swt,Uid:07ce99d3-3b9a-4a97-be21-c81199d9e00b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.785009 kubelet[2102]: E0515 10:44:00.784937 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.785009 kubelet[2102]: E0515 10:44:00.784955 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-956fd76b-r2swt" May 15 10:44:00.785009 kubelet[2102]: E0515 10:44:00.784966 2102 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-956fd76b-r2swt" May 15 10:44:00.785117 kubelet[2102]: E0515 10:44:00.784985 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-956fd76b-r2swt_calico-system(07ce99d3-3b9a-4a97-be21-c81199d9e00b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-956fd76b-r2swt_calico-system(07ce99d3-3b9a-4a97-be21-c81199d9e00b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-956fd76b-r2swt" podUID="07ce99d3-3b9a-4a97-be21-c81199d9e00b" May 15 10:44:00.788708 env[1269]: time="2025-05-15T10:44:00.788683671Z" level=error msg="Failed to destroy network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.788902 env[1269]: time="2025-05-15T10:44:00.788883514Z" level=error msg="encountered an error cleaning up failed sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.788950 env[1269]: time="2025-05-15T10:44:00.788912498Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49d8bdc-pcch5,Uid:c7dc7561-18b0-4ced-b105-6e410668e1a9,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.789445 kubelet[2102]: E0515 10:44:00.789087 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.789445 kubelet[2102]: E0515 10:44:00.789115 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d49d8bdc-pcch5" May 15 10:44:00.789445 kubelet[2102]: E0515 10:44:00.789128 2102 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d49d8bdc-pcch5" May 15 10:44:00.789528 kubelet[2102]: E0515 10:44:00.789148 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-d49d8bdc-pcch5_calico-apiserver(c7dc7561-18b0-4ced-b105-6e410668e1a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-d49d8bdc-pcch5_calico-apiserver(c7dc7561-18b0-4ced-b105-6e410668e1a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d49d8bdc-pcch5" podUID="c7dc7561-18b0-4ced-b105-6e410668e1a9" May 15 10:44:00.790133 env[1269]: time="2025-05-15T10:44:00.790115651Z" level=error msg="Failed to destroy network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.790441 env[1269]: time="2025-05-15T10:44:00.790424557Z" level=error msg="encountered an error cleaning up failed sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.790516 env[1269]: time="2025-05-15T10:44:00.790499140Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qznsj,Uid:b67a3be5-f48f-469c-afaa-fe33556ead05,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.790760 kubelet[2102]: E0515 10:44:00.790725 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:00.790799 kubelet[2102]: E0515 10:44:00.790771 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-qznsj" May 15 10:44:00.790799 kubelet[2102]: E0515 10:44:00.790786 2102 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-qznsj" May 15 10:44:00.790843 kubelet[2102]: E0515 10:44:00.790805 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-qznsj_kube-system(b67a3be5-f48f-469c-afaa-fe33556ead05)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-qznsj_kube-system(b67a3be5-f48f-469c-afaa-fe33556ead05)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-qznsj" podUID="b67a3be5-f48f-469c-afaa-fe33556ead05" May 15 10:44:01.003869 systemd[1]: Created slice kubepods-besteffort-pod8fbc89e8_a6f4_4e00_a09c_5ee0d9d4e9e8.slice. May 15 10:44:01.006349 env[1269]: time="2025-05-15T10:44:01.006321569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bttzv,Uid:8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8,Namespace:calico-system,Attempt:0,}" May 15 10:44:01.049559 env[1269]: time="2025-05-15T10:44:01.049474449Z" level=error msg="Failed to destroy network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.052057 env[1269]: time="2025-05-15T10:44:01.051709564Z" level=error msg="encountered an error cleaning up failed sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.052057 env[1269]: time="2025-05-15T10:44:01.051755901Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bttzv,Uid:8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.050858 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38-shm.mount: Deactivated successfully. May 15 10:44:01.052159 kubelet[2102]: E0515 10:44:01.052120 2102 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.052159 kubelet[2102]: E0515 10:44:01.052150 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bttzv" May 15 10:44:01.052316 kubelet[2102]: E0515 10:44:01.052163 2102 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bttzv" May 15 10:44:01.052316 kubelet[2102]: E0515 10:44:01.052246 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bttzv_calico-system(8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bttzv_calico-system(8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bttzv" podUID="8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8" May 15 10:44:01.101125 env[1269]: time="2025-05-15T10:44:01.101100883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:44:01.119608 env[1269]: time="2025-05-15T10:44:01.119585685Z" level=info msg="StopPodSandbox for \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\"" May 15 10:44:01.120375 kubelet[2102]: I0515 10:44:01.120359 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:01.120446 kubelet[2102]: I0515 10:44:01.120390 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:01.120943 env[1269]: time="2025-05-15T10:44:01.120925887Z" level=info msg="StopPodSandbox for \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\"" May 15 10:44:01.121260 kubelet[2102]: I0515 10:44:01.121248 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:01.121628 env[1269]: time="2025-05-15T10:44:01.121615481Z" level=info msg="StopPodSandbox for \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\"" May 15 10:44:01.122058 kubelet[2102]: I0515 10:44:01.122016 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:01.122340 env[1269]: time="2025-05-15T10:44:01.122323470Z" level=info msg="StopPodSandbox for \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\"" May 15 10:44:01.124096 kubelet[2102]: I0515 10:44:01.124078 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:01.124446 env[1269]: time="2025-05-15T10:44:01.124425478Z" level=info msg="StopPodSandbox for \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\"" May 15 10:44:01.126563 kubelet[2102]: I0515 10:44:01.126545 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:01.127443 env[1269]: time="2025-05-15T10:44:01.127415534Z" level=info msg="StopPodSandbox for \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\"" May 15 10:44:01.164809 env[1269]: time="2025-05-15T10:44:01.164750607Z" level=error msg="StopPodSandbox for \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\" failed" error="failed to destroy network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.165570 kubelet[2102]: E0515 10:44:01.165535 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:01.167092 kubelet[2102]: E0515 10:44:01.165586 2102 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6"} May 15 10:44:01.167192 kubelet[2102]: E0515 10:44:01.167109 2102 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"07ce99d3-3b9a-4a97-be21-c81199d9e00b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:44:01.167192 kubelet[2102]: E0515 10:44:01.167151 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"07ce99d3-3b9a-4a97-be21-c81199d9e00b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-956fd76b-r2swt" podUID="07ce99d3-3b9a-4a97-be21-c81199d9e00b" May 15 10:44:01.180668 env[1269]: time="2025-05-15T10:44:01.180622613Z" level=error msg="StopPodSandbox for \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\" failed" error="failed to destroy network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.180971 kubelet[2102]: E0515 10:44:01.180939 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:01.181026 kubelet[2102]: E0515 10:44:01.180991 2102 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38"} May 15 10:44:01.181071 kubelet[2102]: E0515 10:44:01.181020 2102 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:44:01.181127 kubelet[2102]: E0515 10:44:01.181073 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bttzv" podUID="8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8" May 15 10:44:01.200521 env[1269]: time="2025-05-15T10:44:01.200475918Z" level=error msg="StopPodSandbox for \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\" failed" error="failed to destroy network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.200674 kubelet[2102]: E0515 10:44:01.200636 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:01.200721 kubelet[2102]: E0515 10:44:01.200682 2102 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf"} May 15 10:44:01.200721 kubelet[2102]: E0515 10:44:01.200705 2102 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b67a3be5-f48f-469c-afaa-fe33556ead05\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:44:01.200798 kubelet[2102]: E0515 10:44:01.200718 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b67a3be5-f48f-469c-afaa-fe33556ead05\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-qznsj" podUID="b67a3be5-f48f-469c-afaa-fe33556ead05" May 15 10:44:01.202678 env[1269]: time="2025-05-15T10:44:01.202654083Z" level=error msg="StopPodSandbox for \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\" failed" error="failed to destroy network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.202846 kubelet[2102]: E0515 10:44:01.202828 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:01.202884 kubelet[2102]: E0515 10:44:01.202849 2102 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f"} May 15 10:44:01.202884 kubelet[2102]: E0515 10:44:01.202866 2102 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4877dea9-5148-4e17-852e-f380a1e02cd0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:44:01.202969 kubelet[2102]: E0515 10:44:01.202894 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4877dea9-5148-4e17-852e-f380a1e02cd0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d49d8bdc-n8crk" podUID="4877dea9-5148-4e17-852e-f380a1e02cd0" May 15 10:44:01.208154 env[1269]: time="2025-05-15T10:44:01.208120945Z" level=error msg="StopPodSandbox for \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\" failed" error="failed to destroy network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.208403 kubelet[2102]: E0515 10:44:01.208365 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:01.208446 kubelet[2102]: E0515 10:44:01.208410 2102 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30"} May 15 10:44:01.208446 kubelet[2102]: E0515 10:44:01.208433 2102 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c7dc7561-18b0-4ced-b105-6e410668e1a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:44:01.208517 kubelet[2102]: E0515 10:44:01.208447 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c7dc7561-18b0-4ced-b105-6e410668e1a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d49d8bdc-pcch5" podUID="c7dc7561-18b0-4ced-b105-6e410668e1a9" May 15 10:44:01.211225 env[1269]: time="2025-05-15T10:44:01.211197598Z" level=error msg="StopPodSandbox for \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\" failed" error="failed to destroy network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:44:01.211334 kubelet[2102]: E0515 10:44:01.211306 2102 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:01.211369 kubelet[2102]: E0515 10:44:01.211349 2102 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f"} May 15 10:44:01.211394 kubelet[2102]: E0515 10:44:01.211368 2102 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c76e5f8c-48a4-445b-9d75-a7928050f62f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:44:01.211394 kubelet[2102]: E0515 10:44:01.211386 2102 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c76e5f8c-48a4-445b-9d75-a7928050f62f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-j2jp6" podUID="c76e5f8c-48a4-445b-9d75-a7928050f62f" May 15 10:44:06.293902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1384533909.mount: Deactivated successfully. May 15 10:44:06.326878 env[1269]: time="2025-05-15T10:44:06.326774529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:06.328517 env[1269]: time="2025-05-15T10:44:06.328494954Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:06.332810 env[1269]: time="2025-05-15T10:44:06.332784626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:06.334225 env[1269]: time="2025-05-15T10:44:06.333314137Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 10:44:06.334225 env[1269]: time="2025-05-15T10:44:06.333901048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:06.352227 env[1269]: time="2025-05-15T10:44:06.352203490Z" level=info msg="CreateContainer within sandbox \"70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:44:06.360697 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1790300112.mount: Deactivated successfully. May 15 10:44:06.365568 env[1269]: time="2025-05-15T10:44:06.365535551Z" level=info msg="CreateContainer within sandbox \"70d1aab201c93091e9d82d8754834743d5c4efcce6eaba349186c834f1906728\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"75720a6c78d07c71475b8d793394883ad306fb78c5da3209f76ef3ed4794be27\"" May 15 10:44:06.366660 env[1269]: time="2025-05-15T10:44:06.365995932Z" level=info msg="StartContainer for \"75720a6c78d07c71475b8d793394883ad306fb78c5da3209f76ef3ed4794be27\"" May 15 10:44:06.380385 systemd[1]: Started cri-containerd-75720a6c78d07c71475b8d793394883ad306fb78c5da3209f76ef3ed4794be27.scope. May 15 10:44:06.409000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.443819 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 10:44:06.459967 kernel: audit: type=1400 audit(1747305846.409:1017): avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.469379 kernel: audit: type=1300 audit(1747305846.409:1017): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f52942c2e38 items=0 ppid=2555 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:06.469428 kernel: audit: type=1327 audit(1747305846.409:1017): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373230613663373864303763373134373562386437393333393438 May 15 10:44:06.469446 kernel: audit: type=1400 audit(1747305846.417:1018): avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.469461 kernel: audit: type=1400 audit(1747305846.417:1018): avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.469473 kernel: audit: type=1400 audit(1747305846.417:1018): avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.469485 kernel: audit: type=1400 audit(1747305846.417:1018): avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.469503 kernel: audit: type=1400 audit(1747305846.417:1018): avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.469519 kernel: audit: type=1400 audit(1747305846.417:1018): avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.469533 kernel: audit: type=1400 audit(1747305846.417:1018): avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.409000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f52942c2e38 items=0 ppid=2555 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:06.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373230613663373864303763373134373562386437393333393438 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit: BPF prog-id=139 op=LOAD May 15 10:44:06.417000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00035a698 items=0 ppid=2555 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:06.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373230613663373864303763373134373562386437393333393438 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit: BPF prog-id=140 op=LOAD May 15 10:44:06.417000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00035a6e8 items=0 ppid=2555 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:06.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373230613663373864303763373134373562386437393333393438 May 15 10:44:06.417000 audit: BPF prog-id=140 op=UNLOAD May 15 10:44:06.417000 audit: BPF prog-id=139 op=UNLOAD May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { perfmon } for pid=3145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit[3145]: AVC avc: denied { bpf } for pid=3145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:06.417000 audit: BPF prog-id=141 op=LOAD May 15 10:44:06.417000 audit[3145]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00035a778 items=0 ppid=2555 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:06.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373230613663373864303763373134373562386437393333393438 May 15 10:44:06.525796 env[1269]: time="2025-05-15T10:44:06.455068575Z" level=info msg="StartContainer for \"75720a6c78d07c71475b8d793394883ad306fb78c5da3209f76ef3ed4794be27\" returns successfully" May 15 10:44:07.172897 kubelet[2102]: I0515 10:44:07.169863 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wctxg" podStartSLOduration=1.464490578 podStartE2EDuration="18.163996236s" podCreationTimestamp="2025-05-15 10:43:49 +0000 UTC" firstStartedPulling="2025-05-15 10:43:49.635153874 +0000 UTC m=+10.809809823" lastFinishedPulling="2025-05-15 10:44:06.334659529 +0000 UTC m=+27.509315481" observedRunningTime="2025-05-15 10:44:07.162224894 +0000 UTC m=+28.336880856" watchObservedRunningTime="2025-05-15 10:44:07.163996236 +0000 UTC m=+28.338652205" May 15 10:44:07.387426 systemd[1]: Started sshd@7-139.178.70.100:22-198.244.189.210:38170.service. May 15 10:44:07.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-198.244.189.210:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:07.464320 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:44:07.464439 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:44:08.029000 audit[3269]: AVC avc: denied { write } for pid=3269 comm="tee" name="fd" dev="proc" ino=35163 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:44:08.029000 audit[3269]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd77f74a2e a2=241 a3=1b6 items=1 ppid=3242 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.029000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:44:08.029000 audit: PATH item=0 name="/dev/fd/63" inode=35145 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:44:08.029000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:44:08.040000 audit[3280]: AVC avc: denied { write } for pid=3280 comm="tee" name="fd" dev="proc" ino=36199 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:44:08.040000 audit[3280]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc37e3a1e a2=241 a3=1b6 items=1 ppid=3234 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.040000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:44:08.040000 audit: PATH item=0 name="/dev/fd/63" inode=36196 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:44:08.040000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:44:08.049000 audit[3277]: AVC avc: denied { write } for pid=3277 comm="tee" name="fd" dev="proc" ino=35189 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:44:08.052000 audit[3282]: AVC avc: denied { write } for pid=3282 comm="tee" name="fd" dev="proc" ino=35194 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:44:08.049000 audit[3277]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe56d63a1f a2=241 a3=1b6 items=1 ppid=3238 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.049000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:44:08.049000 audit: PATH item=0 name="/dev/fd/63" inode=35160 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:44:08.049000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:44:08.052000 audit[3282]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce8fb3a2f a2=241 a3=1b6 items=1 ppid=3240 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.052000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:44:08.052000 audit: PATH item=0 name="/dev/fd/63" inode=35171 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:44:08.052000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:44:08.068000 audit[3297]: AVC avc: denied { write } for pid=3297 comm="tee" name="fd" dev="proc" ino=35209 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:44:08.068000 audit[3297]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe05ff5a2e a2=241 a3=1b6 items=1 ppid=3235 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.068000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:44:08.068000 audit: PATH item=0 name="/dev/fd/63" inode=35201 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:44:08.068000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:44:08.077000 audit[3299]: AVC avc: denied { write } for pid=3299 comm="tee" name="fd" dev="proc" ino=36213 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:44:08.077000 audit[3299]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd94c96a30 a2=241 a3=1b6 items=1 ppid=3232 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.077000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:44:08.077000 audit: PATH item=0 name="/dev/fd/63" inode=35205 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:44:08.077000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:44:08.084000 audit[3304]: AVC avc: denied { write } for pid=3304 comm="tee" name="fd" dev="proc" ino=35214 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:44:08.084000 audit[3304]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffaa9aca2e a2=241 a3=1b6 items=1 ppid=3258 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.084000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:44:08.084000 audit: PATH item=0 name="/dev/fd/63" inode=35206 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:44:08.084000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:44:08.155374 systemd[1]: run-containerd-runc-k8s.io-75720a6c78d07c71475b8d793394883ad306fb78c5da3209f76ef3ed4794be27-runc.3CZnvr.mount: Deactivated successfully. May 15 10:44:08.252000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.252000 audit: BPF prog-id=142 op=LOAD May 15 10:44:08.252000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9232d9c0 a2=98 a3=3 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.252000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.253000 audit: BPF prog-id=142 op=UNLOAD May 15 10:44:08.254000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit: BPF prog-id=143 op=LOAD May 15 10:44:08.254000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9232d7a0 a2=74 a3=540051 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.254000 audit: BPF prog-id=143 op=UNLOAD May 15 10:44:08.254000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.254000 audit: BPF prog-id=144 op=LOAD May 15 10:44:08.254000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9232d7d0 a2=94 a3=2 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.254000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.254000 audit: BPF prog-id=144 op=UNLOAD May 15 10:44:08.321000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.321000 audit: BPF prog-id=145 op=LOAD May 15 10:44:08.321000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9232d690 a2=40 a3=1 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.321000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.322000 audit: BPF prog-id=145 op=UNLOAD May 15 10:44:08.322000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.322000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe9232d760 a2=50 a3=7ffe9232d840 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.322000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9232d6a0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9232d6d0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9232d5e0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9232d6f0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9232d6d0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9232d6c0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9232d6f0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9232d6d0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9232d6f0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9232d6c0 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9232d730 a2=28 a3=0 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9232d4e0 a2=50 a3=1 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit: BPF prog-id=146 op=LOAD May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9232d4e0 a2=94 a3=5 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit: BPF prog-id=146 op=UNLOAD May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9232d590 a2=50 a3=1 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe9232d6b0 a2=4 a3=38 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.329000 audit[3367]: AVC avc: denied { confidentiality } for pid=3367 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:44:08.329000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9232d700 a2=94 a3=6 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.329000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.330000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { confidentiality } for pid=3367 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:44:08.330000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9232ceb0 a2=94 a3=83 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.330000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.330000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.330000 audit[3367]: AVC avc: denied { confidentiality } for pid=3367 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:44:08.330000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9232ceb0 a2=94 a3=83 items=0 ppid=3259 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.330000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:44:08.341000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.341000 audit: BPF prog-id=147 op=LOAD May 15 10:44:08.341000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec4dd28e0 a2=98 a3=1999999999999999 items=0 ppid=3259 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.341000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:44:08.342000 audit: BPF prog-id=147 op=UNLOAD May 15 10:44:08.342000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit: BPF prog-id=148 op=LOAD May 15 10:44:08.342000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec4dd27c0 a2=74 a3=ffff items=0 ppid=3259 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.342000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:44:08.342000 audit: BPF prog-id=148 op=UNLOAD May 15 10:44:08.342000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { perfmon } for pid=3370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit[3370]: AVC avc: denied { bpf } for pid=3370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.342000 audit: BPF prog-id=149 op=LOAD May 15 10:44:08.342000 audit[3370]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec4dd2800 a2=40 a3=7ffec4dd29e0 items=0 ppid=3259 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.342000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:44:08.343000 audit: BPF prog-id=149 op=UNLOAD May 15 10:44:08.401193 systemd-networkd[1061]: vxlan.calico: Link UP May 15 10:44:08.401197 systemd-networkd[1061]: vxlan.calico: Gained carrier May 15 10:44:08.400000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.400000 audit: BPF prog-id=150 op=LOAD May 15 10:44:08.400000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3372d9d0 a2=98 a3=ffffffff items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.400000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.400000 audit: BPF prog-id=150 op=UNLOAD May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit: BPF prog-id=151 op=LOAD May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3372d7e0 a2=74 a3=540051 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit: BPF prog-id=151 op=UNLOAD May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit: BPF prog-id=152 op=LOAD May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc3372d810 a2=94 a3=2 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit: BPF prog-id=152 op=UNLOAD May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3372d6e0 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3372d710 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3372d620 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3372d730 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3372d710 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3372d700 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3372d730 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3372d710 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3372d730 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc3372d700 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc3372d770 a2=28 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.403000 audit: BPF prog-id=153 op=LOAD May 15 10:44:08.403000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3372d5e0 a2=40 a3=0 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.403000 audit: BPF prog-id=153 op=UNLOAD May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc3372d5d0 a2=50 a3=2800 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.405000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc3372d5d0 a2=50 a3=2800 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.405000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit: BPF prog-id=154 op=LOAD May 15 10:44:08.405000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3372cdf0 a2=94 a3=2 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.405000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.405000 audit: BPF prog-id=154 op=UNLOAD May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.405000 audit: BPF prog-id=155 op=LOAD May 15 10:44:08.405000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc3372cef0 a2=94 a3=30 items=0 ppid=3259 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.405000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit: BPF prog-id=156 op=LOAD May 15 10:44:08.408000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe99144c70 a2=98 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.408000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.408000 audit: BPF prog-id=156 op=UNLOAD May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit: BPF prog-id=157 op=LOAD May 15 10:44:08.408000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe99144a50 a2=74 a3=540051 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.408000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.408000 audit: BPF prog-id=157 op=UNLOAD May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.408000 audit: BPF prog-id=158 op=LOAD May 15 10:44:08.408000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe99144a80 a2=94 a3=2 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.408000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.408000 audit: BPF prog-id=158 op=UNLOAD May 15 10:44:08.520000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit: BPF prog-id=159 op=LOAD May 15 10:44:08.520000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe99144940 a2=40 a3=1 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.520000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.520000 audit: BPF prog-id=159 op=UNLOAD May 15 10:44:08.520000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.520000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe99144a10 a2=50 a3=7ffe99144af0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.520000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.530000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.530000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe99144950 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.530000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.530000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99144980 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.530000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.530000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99144890 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.530000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.530000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe991449a0 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.530000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.530000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe99144980 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.530000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.530000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe99144970 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.530000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe991449a0 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99144980 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe991449a0 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99144970 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe991449e0 a2=28 a3=0 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe99144790 a2=50 a3=1 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit: BPF prog-id=160 op=LOAD May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe99144790 a2=94 a3=5 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit: BPF prog-id=160 op=UNLOAD May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe99144840 a2=50 a3=1 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe99144960 a2=4 a3=38 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { confidentiality } for pid=3400 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe991449b0 a2=94 a3=6 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { confidentiality } for pid=3400 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe99144160 a2=94 a3=83 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { perfmon } for pid=3400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.531000 audit[3400]: AVC avc: denied { confidentiality } for pid=3400 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:44:08.531000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe99144160 a2=94 a3=83 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.531000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.532000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.532000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe99145ba0 a2=10 a3=f1f00800 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.532000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.532000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.532000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe99145a40 a2=10 a3=3 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.532000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.532000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.532000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe991459e0 a2=10 a3=3 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.532000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.532000 audit[3400]: AVC avc: denied { bpf } for pid=3400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:08.532000 audit[3400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe991459e0 a2=10 a3=7 items=0 ppid=3259 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.532000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:44:08.537000 audit: BPF prog-id=155 op=UNLOAD May 15 10:44:08.542687 sshd[3200]: Invalid user aurora from 198.244.189.210 port 38170 May 15 10:44:08.550251 sshd[3200]: pam_faillock(sshd:auth): User unknown May 15 10:44:08.550857 sshd[3200]: pam_unix(sshd:auth): check pass; user unknown May 15 10:44:08.550877 sshd[3200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.244.189.210 May 15 10:44:08.550000 audit[3200]: USER_AUTH pid=3200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="aurora" exe="/usr/sbin/sshd" hostname=198.244.189.210 addr=198.244.189.210 terminal=ssh res=failed' May 15 10:44:08.551252 sshd[3200]: pam_faillock(sshd:auth): User unknown May 15 10:44:08.594000 audit[3435]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3435 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:08.594000 audit[3435]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffed4494ca0 a2=0 a3=7ffed4494c8c items=0 ppid=3259 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.594000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:08.606000 audit[3437]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=3437 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:08.606000 audit[3437]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc98d20b40 a2=0 a3=7ffc98d20b2c items=0 ppid=3259 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.606000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:08.608000 audit[3436]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3436 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:08.608000 audit[3436]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd26a00fa0 a2=0 a3=7ffd26a00f8c items=0 ppid=3259 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.608000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:08.611000 audit[3434]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3434 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:08.611000 audit[3434]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc1117cc20 a2=0 a3=7ffc1117cc0c items=0 ppid=3259 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:08.611000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:10.315178 systemd-networkd[1061]: vxlan.calico: Gained IPv6LL May 15 10:44:10.896011 sshd[3200]: Failed password for invalid user aurora from 198.244.189.210 port 38170 ssh2 May 15 10:44:12.156279 sshd[3200]: Received disconnect from 198.244.189.210 port 38170:11: Bye Bye [preauth] May 15 10:44:12.156279 sshd[3200]: Disconnected from invalid user aurora 198.244.189.210 port 38170 [preauth] May 15 10:44:12.157306 systemd[1]: sshd@7-139.178.70.100:22-198.244.189.210:38170.service: Deactivated successfully. May 15 10:44:12.159004 kernel: kauditd_printk_skb: 550 callbacks suppressed May 15 10:44:12.162408 kernel: audit: type=1131 audit(1747305852.156:1127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-198.244.189.210:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:12.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-198.244.189.210:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:12.999960 env[1269]: time="2025-05-15T10:44:12.999563338Z" level=info msg="StopPodSandbox for \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\"" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.051 [INFO][3465] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.052 [INFO][3465] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" iface="eth0" netns="/var/run/netns/cni-b4e9534e-9818-46eb-b999-2b00940a0db5" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.052 [INFO][3465] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" iface="eth0" netns="/var/run/netns/cni-b4e9534e-9818-46eb-b999-2b00940a0db5" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.054 [INFO][3465] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" iface="eth0" netns="/var/run/netns/cni-b4e9534e-9818-46eb-b999-2b00940a0db5" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.054 [INFO][3465] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.054 [INFO][3465] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.254 [INFO][3472] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.294 [INFO][3472] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.294 [INFO][3472] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.412 [WARNING][3472] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.412 [INFO][3472] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.422 [INFO][3472] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:13.424739 env[1269]: 2025-05-15 10:44:13.423 [INFO][3465] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:13.426823 env[1269]: time="2025-05-15T10:44:13.426234468Z" level=info msg="TearDown network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\" successfully" May 15 10:44:13.426823 env[1269]: time="2025-05-15T10:44:13.426256305Z" level=info msg="StopPodSandbox for \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\" returns successfully" May 15 10:44:13.426202 systemd[1]: run-netns-cni\x2db4e9534e\x2d9818\x2d46eb\x2db999\x2d2b00940a0db5.mount: Deactivated successfully. May 15 10:44:13.433790 env[1269]: time="2025-05-15T10:44:13.433774048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bttzv,Uid:8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8,Namespace:calico-system,Attempt:1,}" May 15 10:44:13.668292 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:44:13.668383 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali15a4390f008: link becomes ready May 15 10:44:13.665804 systemd-networkd[1061]: cali15a4390f008: Link UP May 15 10:44:13.668334 systemd-networkd[1061]: cali15a4390f008: Gained carrier May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.500 [INFO][3479] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--bttzv-eth0 csi-node-driver- calico-system 8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8 729 0 2025-05-15 10:43:49 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-bttzv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali15a4390f008 [] []}} ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Namespace="calico-system" Pod="csi-node-driver-bttzv" WorkloadEndpoint="localhost-k8s-csi--node--driver--bttzv-" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.500 [INFO][3479] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Namespace="calico-system" Pod="csi-node-driver-bttzv" WorkloadEndpoint="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.603 [INFO][3492] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" HandleID="k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.622 [INFO][3492] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" HandleID="k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ef530), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-bttzv", "timestamp":"2025-05-15 10:44:13.603710698 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.622 [INFO][3492] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.622 [INFO][3492] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.622 [INFO][3492] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.636 [INFO][3492] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.645 [INFO][3492] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.649 [INFO][3492] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.650 [INFO][3492] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.652 [INFO][3492] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.652 [INFO][3492] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.653 [INFO][3492] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.656 [INFO][3492] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.661 [INFO][3492] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.661 [INFO][3492] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" host="localhost" May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.661 [INFO][3492] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:13.681012 env[1269]: 2025-05-15 10:44:13.661 [INFO][3492] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" HandleID="k8s-pod-network.f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.683017 env[1269]: 2025-05-15 10:44:13.663 [INFO][3479] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Namespace="calico-system" Pod="csi-node-driver-bttzv" WorkloadEndpoint="localhost-k8s-csi--node--driver--bttzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--bttzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-bttzv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali15a4390f008", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:13.683017 env[1269]: 2025-05-15 10:44:13.663 [INFO][3479] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Namespace="calico-system" Pod="csi-node-driver-bttzv" WorkloadEndpoint="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.683017 env[1269]: 2025-05-15 10:44:13.663 [INFO][3479] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali15a4390f008 ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Namespace="calico-system" Pod="csi-node-driver-bttzv" WorkloadEndpoint="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.683017 env[1269]: 2025-05-15 10:44:13.668 [INFO][3479] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Namespace="calico-system" Pod="csi-node-driver-bttzv" WorkloadEndpoint="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.683017 env[1269]: 2025-05-15 10:44:13.669 [INFO][3479] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Namespace="calico-system" Pod="csi-node-driver-bttzv" WorkloadEndpoint="localhost-k8s-csi--node--driver--bttzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--bttzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a", Pod:"csi-node-driver-bttzv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali15a4390f008", MAC:"82:4c:26:5f:c1:a8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:13.683017 env[1269]: 2025-05-15 10:44:13.678 [INFO][3479] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a" Namespace="calico-system" Pod="csi-node-driver-bttzv" WorkloadEndpoint="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:13.704348 kernel: audit: type=1325 audit(1747305853.695:1128): table=filter:101 family=2 entries=34 op=nft_register_chain pid=3527 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:13.704537 kernel: audit: type=1300 audit(1747305853.695:1128): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe14a1f330 a2=0 a3=7ffe14a1f31c items=0 ppid=3259 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:13.695000 audit[3527]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3527 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:13.707866 kernel: audit: type=1327 audit(1747305853.695:1128): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:13.695000 audit[3527]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe14a1f330 a2=0 a3=7ffe14a1f31c items=0 ppid=3259 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:13.695000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:13.708651 env[1269]: time="2025-05-15T10:44:13.708588678Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:44:13.708651 env[1269]: time="2025-05-15T10:44:13.708610958Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:44:13.708651 env[1269]: time="2025-05-15T10:44:13.708617966Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:44:13.708830 env[1269]: time="2025-05-15T10:44:13.708693151Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a pid=3532 runtime=io.containerd.runc.v2 May 15 10:44:13.723944 systemd[1]: Started cri-containerd-f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a.scope. May 15 10:44:13.738949 kernel: audit: type=1400 audit(1747305853.731:1129): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.739022 kernel: audit: type=1400 audit(1747305853.731:1130): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.744353 kernel: audit: type=1400 audit(1747305853.731:1131): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.744413 kernel: audit: type=1400 audit(1747305853.731:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.746913 kernel: audit: type=1400 audit(1747305853.731:1133): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.744658 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:44:13.749876 kernel: audit: type=1400 audit(1747305853.731:1134): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.735000 audit: BPF prog-id=161 op=LOAD May 15 10:44:13.738000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3532 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:13.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366263353662363734383662316438383464353365656665663131 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3532 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:13.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366263353662363734383662316438383464353365656665663131 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.738000 audit: BPF prog-id=162 op=LOAD May 15 10:44:13.738000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000265e80 items=0 ppid=3532 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:13.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366263353662363734383662316438383464353365656665663131 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit: BPF prog-id=163 op=LOAD May 15 10:44:13.741000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000265ec8 items=0 ppid=3532 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:13.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366263353662363734383662316438383464353365656665663131 May 15 10:44:13.741000 audit: BPF prog-id=163 op=UNLOAD May 15 10:44:13.741000 audit: BPF prog-id=162 op=UNLOAD May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:13.741000 audit: BPF prog-id=164 op=LOAD May 15 10:44:13.741000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00034a2d8 items=0 ppid=3532 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:13.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631366263353662363734383662316438383464353365656665663131 May 15 10:44:13.755731 env[1269]: time="2025-05-15T10:44:13.755709526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bttzv,Uid:8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8,Namespace:calico-system,Attempt:1,} returns sandbox id \"f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a\"" May 15 10:44:13.756737 env[1269]: time="2025-05-15T10:44:13.756723589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:44:13.999393 env[1269]: time="2025-05-15T10:44:13.997839489Z" level=info msg="StopPodSandbox for \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\"" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.027 [INFO][3580] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.027 [INFO][3580] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" iface="eth0" netns="/var/run/netns/cni-682651f3-6b4d-6453-6644-cf4f24dc1974" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.027 [INFO][3580] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" iface="eth0" netns="/var/run/netns/cni-682651f3-6b4d-6453-6644-cf4f24dc1974" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.027 [INFO][3580] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" iface="eth0" netns="/var/run/netns/cni-682651f3-6b4d-6453-6644-cf4f24dc1974" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.027 [INFO][3580] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.027 [INFO][3580] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.043 [INFO][3588] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.044 [INFO][3588] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.044 [INFO][3588] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.047 [WARNING][3588] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.047 [INFO][3588] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.048 [INFO][3588] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:14.050408 env[1269]: 2025-05-15 10:44:14.049 [INFO][3580] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:14.051575 env[1269]: time="2025-05-15T10:44:14.050575720Z" level=info msg="TearDown network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\" successfully" May 15 10:44:14.051575 env[1269]: time="2025-05-15T10:44:14.050597552Z" level=info msg="StopPodSandbox for \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\" returns successfully" May 15 10:44:14.051575 env[1269]: time="2025-05-15T10:44:14.051197900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49d8bdc-pcch5,Uid:c7dc7561-18b0-4ced-b105-6e410668e1a9,Namespace:calico-apiserver,Attempt:1,}" May 15 10:44:14.114252 systemd-networkd[1061]: cali9b9fc9126e0: Link UP May 15 10:44:14.115758 systemd-networkd[1061]: cali9b9fc9126e0: Gained carrier May 15 10:44:14.116069 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9b9fc9126e0: link becomes ready May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.074 [INFO][3594] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0 calico-apiserver-d49d8bdc- calico-apiserver c7dc7561-18b0-4ced-b105-6e410668e1a9 736 0 2025-05-15 10:43:49 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:d49d8bdc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-d49d8bdc-pcch5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9b9fc9126e0 [] []}} ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-pcch5" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.074 [INFO][3594] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-pcch5" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.091 [INFO][3607] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" HandleID="k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.096 [INFO][3607] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" HandleID="k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031d700), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-d49d8bdc-pcch5", "timestamp":"2025-05-15 10:44:14.091458619 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.096 [INFO][3607] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.096 [INFO][3607] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.096 [INFO][3607] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.097 [INFO][3607] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.099 [INFO][3607] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.101 [INFO][3607] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.102 [INFO][3607] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.103 [INFO][3607] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.103 [INFO][3607] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.104 [INFO][3607] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.106 [INFO][3607] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.109 [INFO][3607] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.109 [INFO][3607] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" host="localhost" May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.109 [INFO][3607] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:14.124634 env[1269]: 2025-05-15 10:44:14.109 [INFO][3607] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" HandleID="k8s-pod-network.34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.125144 env[1269]: 2025-05-15 10:44:14.110 [INFO][3594] cni-plugin/k8s.go 386: Populated endpoint ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-pcch5" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0", GenerateName:"calico-apiserver-d49d8bdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"c7dc7561-18b0-4ced-b105-6e410668e1a9", ResourceVersion:"736", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49d8bdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-d49d8bdc-pcch5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9b9fc9126e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:14.125144 env[1269]: 2025-05-15 10:44:14.111 [INFO][3594] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-pcch5" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.125144 env[1269]: 2025-05-15 10:44:14.111 [INFO][3594] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9b9fc9126e0 ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-pcch5" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.125144 env[1269]: 2025-05-15 10:44:14.116 [INFO][3594] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-pcch5" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.125144 env[1269]: 2025-05-15 10:44:14.116 [INFO][3594] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-pcch5" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0", GenerateName:"calico-apiserver-d49d8bdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"c7dc7561-18b0-4ced-b105-6e410668e1a9", ResourceVersion:"736", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49d8bdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f", Pod:"calico-apiserver-d49d8bdc-pcch5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9b9fc9126e0", MAC:"3a:d4:90:40:b6:3c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:14.125144 env[1269]: 2025-05-15 10:44:14.122 [INFO][3594] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-pcch5" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:14.132348 env[1269]: time="2025-05-15T10:44:14.132221369Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:44:14.132348 env[1269]: time="2025-05-15T10:44:14.132254415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:44:14.132348 env[1269]: time="2025-05-15T10:44:14.132261216Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:44:14.132477 env[1269]: time="2025-05-15T10:44:14.132361280Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f pid=3634 runtime=io.containerd.runc.v2 May 15 10:44:14.139000 audit[3651]: NETFILTER_CFG table=filter:102 family=2 entries=44 op=nft_register_chain pid=3651 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:14.139000 audit[3651]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffd89b998c0 a2=0 a3=7ffd89b998ac items=0 ppid=3259 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:14.139000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:14.145013 systemd[1]: Started cri-containerd-34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f.scope. May 15 10:44:14.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.157000 audit: BPF prog-id=165 op=LOAD May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3634 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:14.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643437323638303831393337616135653662393133666665393137 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3634 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:14.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643437323638303831393337616135653662393133666665393137 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit: BPF prog-id=166 op=LOAD May 15 10:44:14.158000 audit[3646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027dd90 items=0 ppid=3634 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:14.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643437323638303831393337616135653662393133666665393137 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit: BPF prog-id=167 op=LOAD May 15 10:44:14.158000 audit[3646]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027ddd8 items=0 ppid=3634 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:14.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643437323638303831393337616135653662393133666665393137 May 15 10:44:14.158000 audit: BPF prog-id=167 op=UNLOAD May 15 10:44:14.158000 audit: BPF prog-id=166 op=UNLOAD May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { perfmon } for pid=3646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit[3646]: AVC avc: denied { bpf } for pid=3646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:14.158000 audit: BPF prog-id=168 op=LOAD May 15 10:44:14.158000 audit[3646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003741e8 items=0 ppid=3634 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:14.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334643437323638303831393337616135653662393133666665393137 May 15 10:44:14.159857 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:44:14.180688 env[1269]: time="2025-05-15T10:44:14.180665082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49d8bdc-pcch5,Uid:c7dc7561-18b0-4ced-b105-6e410668e1a9,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f\"" May 15 10:44:14.428014 systemd[1]: run-containerd-runc-k8s.io-f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a-runc.pZ0VNk.mount: Deactivated successfully. May 15 10:44:14.428098 systemd[1]: run-netns-cni\x2d682651f3\x2d6b4d\x2d6453\x2d6644\x2dcf4f24dc1974.mount: Deactivated successfully. May 15 10:44:14.731239 systemd-networkd[1061]: cali15a4390f008: Gained IPv6LL May 15 10:44:14.998947 env[1269]: time="2025-05-15T10:44:14.998817975Z" level=info msg="StopPodSandbox for \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\"" May 15 10:44:15.010971 env[1269]: time="2025-05-15T10:44:15.010948780Z" level=info msg="StopPodSandbox for \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\"" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.087 [INFO][3698] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.087 [INFO][3698] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" iface="eth0" netns="/var/run/netns/cni-5551b6ec-7d21-1a50-a3d3-7363f7d99e2d" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.088 [INFO][3698] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" iface="eth0" netns="/var/run/netns/cni-5551b6ec-7d21-1a50-a3d3-7363f7d99e2d" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.088 [INFO][3698] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" iface="eth0" netns="/var/run/netns/cni-5551b6ec-7d21-1a50-a3d3-7363f7d99e2d" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.088 [INFO][3698] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.088 [INFO][3698] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.120 [INFO][3715] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.120 [INFO][3715] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.120 [INFO][3715] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.126 [WARNING][3715] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.126 [INFO][3715] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.126 [INFO][3715] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:15.135452 env[1269]: 2025-05-15 10:44:15.127 [INFO][3698] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:15.145025 env[1269]: time="2025-05-15T10:44:15.137693455Z" level=info msg="TearDown network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\" successfully" May 15 10:44:15.145025 env[1269]: time="2025-05-15T10:44:15.137728724Z" level=info msg="StopPodSandbox for \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\" returns successfully" May 15 10:44:15.145025 env[1269]: time="2025-05-15T10:44:15.138154321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-956fd76b-r2swt,Uid:07ce99d3-3b9a-4a97-be21-c81199d9e00b,Namespace:calico-system,Attempt:1,}" May 15 10:44:15.136872 systemd[1]: run-netns-cni\x2d5551b6ec\x2d7d21\x2d1a50\x2da3d3\x2d7363f7d99e2d.mount: Deactivated successfully. May 15 10:44:15.147331 env[1269]: time="2025-05-15T10:44:15.147307783Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:15.147887 env[1269]: time="2025-05-15T10:44:15.147872168Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:15.153496 env[1269]: time="2025-05-15T10:44:15.153465771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:15.161087 env[1269]: time="2025-05-15T10:44:15.161006983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 10:44:15.162476 env[1269]: time="2025-05-15T10:44:15.162460618Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.120 [INFO][3707] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.120 [INFO][3707] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" iface="eth0" netns="/var/run/netns/cni-cd375ca1-becd-a791-709d-84475d651aad" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.120 [INFO][3707] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" iface="eth0" netns="/var/run/netns/cni-cd375ca1-becd-a791-709d-84475d651aad" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.120 [INFO][3707] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" iface="eth0" netns="/var/run/netns/cni-cd375ca1-becd-a791-709d-84475d651aad" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.120 [INFO][3707] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.121 [INFO][3707] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.146 [INFO][3723] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.147 [INFO][3723] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.147 [INFO][3723] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.154 [WARNING][3723] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.154 [INFO][3723] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.157 [INFO][3723] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:15.162859 env[1269]: 2025-05-15 10:44:15.161 [INFO][3707] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:15.164654 systemd[1]: run-netns-cni\x2dcd375ca1\x2dbecd\x2da791\x2d709d\x2d84475d651aad.mount: Deactivated successfully. May 15 10:44:15.164907 env[1269]: time="2025-05-15T10:44:15.164886987Z" level=info msg="TearDown network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\" successfully" May 15 10:44:15.164962 env[1269]: time="2025-05-15T10:44:15.164949812Z" level=info msg="StopPodSandbox for \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\" returns successfully" May 15 10:44:15.168090 env[1269]: time="2025-05-15T10:44:15.168061961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-j2jp6,Uid:c76e5f8c-48a4-445b-9d75-a7928050f62f,Namespace:kube-system,Attempt:1,}" May 15 10:44:15.168842 env[1269]: time="2025-05-15T10:44:15.168823998Z" level=info msg="CreateContainer within sandbox \"f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:44:15.169238 env[1269]: time="2025-05-15T10:44:15.168209781Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:44:15.180309 env[1269]: time="2025-05-15T10:44:15.180275143Z" level=info msg="CreateContainer within sandbox \"f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7018b937f4f8236591b9725cd5859398fbea1c89015575fd9cc0fed52ead1e85\"" May 15 10:44:15.181600 env[1269]: time="2025-05-15T10:44:15.181583279Z" level=info msg="StartContainer for \"7018b937f4f8236591b9725cd5859398fbea1c89015575fd9cc0fed52ead1e85\"" May 15 10:44:15.215810 systemd[1]: Started cri-containerd-7018b937f4f8236591b9725cd5859398fbea1c89015575fd9cc0fed52ead1e85.scope. May 15 10:44:15.239000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f14711c8328 items=0 ppid=3532 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313862393337663466383233363539316239373235636435383539 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.239000 audit: BPF prog-id=169 op=LOAD May 15 10:44:15.239000 audit[3763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e9fc8 items=0 ppid=3532 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313862393337663466383233363539316239373235636435383539 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit: BPF prog-id=170 op=LOAD May 15 10:44:15.240000 audit[3763]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c8018 items=0 ppid=3532 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313862393337663466383233363539316239373235636435383539 May 15 10:44:15.240000 audit: BPF prog-id=170 op=UNLOAD May 15 10:44:15.240000 audit: BPF prog-id=169 op=UNLOAD May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { perfmon } for pid=3763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit[3763]: AVC avc: denied { bpf } for pid=3763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.240000 audit: BPF prog-id=171 op=LOAD May 15 10:44:15.240000 audit[3763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c80a8 items=0 ppid=3532 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730313862393337663466383233363539316239373235636435383539 May 15 10:44:15.273441 env[1269]: time="2025-05-15T10:44:15.272006665Z" level=info msg="StartContainer for \"7018b937f4f8236591b9725cd5859398fbea1c89015575fd9cc0fed52ead1e85\" returns successfully" May 15 10:44:15.283318 systemd-networkd[1061]: caliec6584a64ee: Link UP May 15 10:44:15.284776 systemd-networkd[1061]: caliec6584a64ee: Gained carrier May 15 10:44:15.285042 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliec6584a64ee: link becomes ready May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.200 [INFO][3730] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0 calico-kube-controllers-956fd76b- calico-system 07ce99d3-3b9a-4a97-be21-c81199d9e00b 745 0 2025-05-15 10:43:49 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:956fd76b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-956fd76b-r2swt eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliec6584a64ee [] []}} ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Namespace="calico-system" Pod="calico-kube-controllers-956fd76b-r2swt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.203 [INFO][3730] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Namespace="calico-system" Pod="calico-kube-controllers-956fd76b-r2swt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.246 [INFO][3770] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" HandleID="k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.254 [INFO][3770] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" HandleID="k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312760), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-956fd76b-r2swt", "timestamp":"2025-05-15 10:44:15.246574711 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.254 [INFO][3770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.254 [INFO][3770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.254 [INFO][3770] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.257 [INFO][3770] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.260 [INFO][3770] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.266 [INFO][3770] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.269 [INFO][3770] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.270 [INFO][3770] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.271 [INFO][3770] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.274 [INFO][3770] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66 May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.277 [INFO][3770] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.280 [INFO][3770] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.280 [INFO][3770] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" host="localhost" May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.280 [INFO][3770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:15.292321 env[1269]: 2025-05-15 10:44:15.280 [INFO][3770] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" HandleID="k8s-pod-network.740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.293310 env[1269]: 2025-05-15 10:44:15.281 [INFO][3730] cni-plugin/k8s.go 386: Populated endpoint ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Namespace="calico-system" Pod="calico-kube-controllers-956fd76b-r2swt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0", GenerateName:"calico-kube-controllers-956fd76b-", Namespace:"calico-system", SelfLink:"", UID:"07ce99d3-3b9a-4a97-be21-c81199d9e00b", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"956fd76b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-956fd76b-r2swt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliec6584a64ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:15.293310 env[1269]: 2025-05-15 10:44:15.282 [INFO][3730] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Namespace="calico-system" Pod="calico-kube-controllers-956fd76b-r2swt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.293310 env[1269]: 2025-05-15 10:44:15.282 [INFO][3730] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliec6584a64ee ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Namespace="calico-system" Pod="calico-kube-controllers-956fd76b-r2swt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.293310 env[1269]: 2025-05-15 10:44:15.283 [INFO][3730] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Namespace="calico-system" Pod="calico-kube-controllers-956fd76b-r2swt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.293310 env[1269]: 2025-05-15 10:44:15.285 [INFO][3730] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Namespace="calico-system" Pod="calico-kube-controllers-956fd76b-r2swt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0", GenerateName:"calico-kube-controllers-956fd76b-", Namespace:"calico-system", SelfLink:"", UID:"07ce99d3-3b9a-4a97-be21-c81199d9e00b", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"956fd76b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66", Pod:"calico-kube-controllers-956fd76b-r2swt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliec6584a64ee", MAC:"ce:8d:b1:57:fb:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:15.293310 env[1269]: 2025-05-15 10:44:15.290 [INFO][3730] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66" Namespace="calico-system" Pod="calico-kube-controllers-956fd76b-r2swt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:15.300000 audit[3815]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3815 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:15.300000 audit[3815]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffe08280660 a2=0 a3=7ffe0828064c items=0 ppid=3259 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.300000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:15.304405 env[1269]: time="2025-05-15T10:44:15.304365530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:44:15.304405 env[1269]: time="2025-05-15T10:44:15.304392502Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:44:15.304508 env[1269]: time="2025-05-15T10:44:15.304484980Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:44:15.304709 env[1269]: time="2025-05-15T10:44:15.304684253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66 pid=3825 runtime=io.containerd.runc.v2 May 15 10:44:15.311977 systemd[1]: Started cri-containerd-740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66.scope. May 15 10:44:15.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.320000 audit: BPF prog-id=172 op=LOAD May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3825 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303034386664656233373639623034306336346132633030356535 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3825 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303034386664656233373639623034306336346132633030356535 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit: BPF prog-id=173 op=LOAD May 15 10:44:15.321000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000388350 items=0 ppid=3825 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303034386664656233373639623034306336346132633030356535 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit: BPF prog-id=174 op=LOAD May 15 10:44:15.321000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000388398 items=0 ppid=3825 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303034386664656233373639623034306336346132633030356535 May 15 10:44:15.321000 audit: BPF prog-id=174 op=UNLOAD May 15 10:44:15.321000 audit: BPF prog-id=173 op=UNLOAD May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.321000 audit: BPF prog-id=175 op=LOAD May 15 10:44:15.321000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003887a8 items=0 ppid=3825 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734303034386664656233373639623034306336346132633030356535 May 15 10:44:15.323597 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:44:15.341525 env[1269]: time="2025-05-15T10:44:15.341491299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-956fd76b-r2swt,Uid:07ce99d3-3b9a-4a97-be21-c81199d9e00b,Namespace:calico-system,Attempt:1,} returns sandbox id \"740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66\"" May 15 10:44:15.378077 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2152ee20cb3: link becomes ready May 15 10:44:15.378147 systemd-networkd[1061]: cali2152ee20cb3: Link UP May 15 10:44:15.378258 systemd-networkd[1061]: cali2152ee20cb3: Gained carrier May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.205 [INFO][3742] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0 coredns-668d6bf9bc- kube-system c76e5f8c-48a4-445b-9d75-a7928050f62f 746 0 2025-05-15 10:43:43 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-j2jp6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2152ee20cb3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Namespace="kube-system" Pod="coredns-668d6bf9bc-j2jp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--j2jp6-" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.205 [INFO][3742] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Namespace="kube-system" Pod="coredns-668d6bf9bc-j2jp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.254 [INFO][3776] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" HandleID="k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.260 [INFO][3776] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" HandleID="k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314970), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-j2jp6", "timestamp":"2025-05-15 10:44:15.254422163 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.264 [INFO][3776] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.280 [INFO][3776] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.280 [INFO][3776] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.357 [INFO][3776] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.359 [INFO][3776] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.364 [INFO][3776] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.365 [INFO][3776] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.366 [INFO][3776] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.366 [INFO][3776] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.367 [INFO][3776] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.369 [INFO][3776] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.372 [INFO][3776] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.372 [INFO][3776] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" host="localhost" May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.373 [INFO][3776] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:15.388368 env[1269]: 2025-05-15 10:44:15.373 [INFO][3776] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" HandleID="k8s-pod-network.bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.388893 env[1269]: 2025-05-15 10:44:15.374 [INFO][3742] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Namespace="kube-system" Pod="coredns-668d6bf9bc-j2jp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c76e5f8c-48a4-445b-9d75-a7928050f62f", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-j2jp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2152ee20cb3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:15.388893 env[1269]: 2025-05-15 10:44:15.374 [INFO][3742] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Namespace="kube-system" Pod="coredns-668d6bf9bc-j2jp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.388893 env[1269]: 2025-05-15 10:44:15.374 [INFO][3742] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2152ee20cb3 ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Namespace="kube-system" Pod="coredns-668d6bf9bc-j2jp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.388893 env[1269]: 2025-05-15 10:44:15.377 [INFO][3742] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Namespace="kube-system" Pod="coredns-668d6bf9bc-j2jp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.388893 env[1269]: 2025-05-15 10:44:15.377 [INFO][3742] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Namespace="kube-system" Pod="coredns-668d6bf9bc-j2jp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c76e5f8c-48a4-445b-9d75-a7928050f62f", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea", Pod:"coredns-668d6bf9bc-j2jp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2152ee20cb3", MAC:"a2:c0:d2:3d:fc:ff", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:15.388893 env[1269]: 2025-05-15 10:44:15.386 [INFO][3742] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea" Namespace="kube-system" Pod="coredns-668d6bf9bc-j2jp6" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:15.397897 env[1269]: time="2025-05-15T10:44:15.397122767Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:44:15.397897 env[1269]: time="2025-05-15T10:44:15.397160035Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:44:15.397897 env[1269]: time="2025-05-15T10:44:15.397174346Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:44:15.397897 env[1269]: time="2025-05-15T10:44:15.397244398Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea pid=3879 runtime=io.containerd.runc.v2 May 15 10:44:15.397000 audit[3884]: NETFILTER_CFG table=filter:104 family=2 entries=46 op=nft_register_chain pid=3884 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:15.397000 audit[3884]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffc5280b120 a2=0 a3=7ffc5280b10c items=0 ppid=3259 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.397000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:15.404949 systemd[1]: Started cri-containerd-bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea.scope. May 15 10:44:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.412000 audit: BPF prog-id=176 op=LOAD May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266616365393165373035333138373130323631393761656164363931 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266616365393165373035333138373130323631393761656164363931 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit: BPF prog-id=177 op=LOAD May 15 10:44:15.413000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000279d90 items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266616365393165373035333138373130323631393761656164363931 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit: BPF prog-id=178 op=LOAD May 15 10:44:15.413000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000279dd8 items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266616365393165373035333138373130323631393761656164363931 May 15 10:44:15.413000 audit: BPF prog-id=178 op=UNLOAD May 15 10:44:15.413000 audit: BPF prog-id=177 op=UNLOAD May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.413000 audit: BPF prog-id=179 op=LOAD May 15 10:44:15.413000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ee1e8 items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266616365393165373035333138373130323631393761656164363931 May 15 10:44:15.415858 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:44:15.438876 env[1269]: time="2025-05-15T10:44:15.438852242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-j2jp6,Uid:c76e5f8c-48a4-445b-9d75-a7928050f62f,Namespace:kube-system,Attempt:1,} returns sandbox id \"bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea\"" May 15 10:44:15.440537 env[1269]: time="2025-05-15T10:44:15.440522301Z" level=info msg="CreateContainer within sandbox \"bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:44:15.451791 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1321353335.mount: Deactivated successfully. May 15 10:44:15.456283 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4229499095.mount: Deactivated successfully. May 15 10:44:15.457890 env[1269]: time="2025-05-15T10:44:15.457871486Z" level=info msg="CreateContainer within sandbox \"bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8d4acfb8bc9a1beeffc389fe922477f40ccf33ba80b7e07fb31ec95f807f3a99\"" May 15 10:44:15.458377 env[1269]: time="2025-05-15T10:44:15.458364896Z" level=info msg="StartContainer for \"8d4acfb8bc9a1beeffc389fe922477f40ccf33ba80b7e07fb31ec95f807f3a99\"" May 15 10:44:15.468135 systemd[1]: Started cri-containerd-8d4acfb8bc9a1beeffc389fe922477f40ccf33ba80b7e07fb31ec95f807f3a99.scope. May 15 10:44:15.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit: BPF prog-id=180 op=LOAD May 15 10:44:15.513000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3879 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346163666238626339613162656566666333383966653932323437 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3879 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346163666238626339613162656566666333383966653932323437 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.513000 audit: BPF prog-id=181 op=LOAD May 15 10:44:15.513000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002d5e10 items=0 ppid=3879 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346163666238626339613162656566666333383966653932323437 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit: BPF prog-id=182 op=LOAD May 15 10:44:15.514000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002d5e58 items=0 ppid=3879 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346163666238626339613162656566666333383966653932323437 May 15 10:44:15.514000 audit: BPF prog-id=182 op=UNLOAD May 15 10:44:15.514000 audit: BPF prog-id=181 op=UNLOAD May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:15.514000 audit: BPF prog-id=183 op=LOAD May 15 10:44:15.514000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000396268 items=0 ppid=3879 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:15.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864346163666238626339613162656566666333383966653932323437 May 15 10:44:15.525563 env[1269]: time="2025-05-15T10:44:15.525497290Z" level=info msg="StartContainer for \"8d4acfb8bc9a1beeffc389fe922477f40ccf33ba80b7e07fb31ec95f807f3a99\" returns successfully" May 15 10:44:15.627163 systemd-networkd[1061]: cali9b9fc9126e0: Gained IPv6LL May 15 10:44:15.697000 audit[3931]: AVC avc: denied { getattr } for pid=3931 comm="coredns" path="cgroup:[4026532622]" dev="nsfs" ino=4026532622 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c643 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 15 10:44:15.697000 audit[3931]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c810 a2=c000128e08 a3=0 items=0 ppid=3879 pid=3931 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c643 key=(null) May 15 10:44:15.697000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 15 10:44:15.997599 env[1269]: time="2025-05-15T10:44:15.997569428Z" level=info msg="StopPodSandbox for \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\"" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.033 [INFO][3963] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.034 [INFO][3963] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" iface="eth0" netns="/var/run/netns/cni-822ea9f9-9f49-1acb-9aa7-b0a9971c107b" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.034 [INFO][3963] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" iface="eth0" netns="/var/run/netns/cni-822ea9f9-9f49-1acb-9aa7-b0a9971c107b" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.034 [INFO][3963] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" iface="eth0" netns="/var/run/netns/cni-822ea9f9-9f49-1acb-9aa7-b0a9971c107b" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.034 [INFO][3963] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.034 [INFO][3963] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.056 [INFO][3971] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.056 [INFO][3971] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.056 [INFO][3971] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.060 [WARNING][3971] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.060 [INFO][3971] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.061 [INFO][3971] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:16.063906 env[1269]: 2025-05-15 10:44:16.062 [INFO][3963] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:16.064465 env[1269]: time="2025-05-15T10:44:16.064442387Z" level=info msg="TearDown network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\" successfully" May 15 10:44:16.064530 env[1269]: time="2025-05-15T10:44:16.064518602Z" level=info msg="StopPodSandbox for \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\" returns successfully" May 15 10:44:16.065054 env[1269]: time="2025-05-15T10:44:16.065020054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qznsj,Uid:b67a3be5-f48f-469c-afaa-fe33556ead05,Namespace:kube-system,Attempt:1,}" May 15 10:44:16.133858 systemd-networkd[1061]: cali5daea2a087e: Link UP May 15 10:44:16.136225 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5daea2a087e: link becomes ready May 15 10:44:16.136123 systemd-networkd[1061]: cali5daea2a087e: Gained carrier May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.093 [INFO][3979] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--qznsj-eth0 coredns-668d6bf9bc- kube-system b67a3be5-f48f-469c-afaa-fe33556ead05 764 0 2025-05-15 10:43:43 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-qznsj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5daea2a087e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Namespace="kube-system" Pod="coredns-668d6bf9bc-qznsj" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qznsj-" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.093 [INFO][3979] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Namespace="kube-system" Pod="coredns-668d6bf9bc-qznsj" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.110 [INFO][3991] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" HandleID="k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.117 [INFO][3991] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" HandleID="k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000317710), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-qznsj", "timestamp":"2025-05-15 10:44:16.110169141 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.117 [INFO][3991] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.117 [INFO][3991] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.117 [INFO][3991] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.118 [INFO][3991] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.120 [INFO][3991] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.123 [INFO][3991] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.124 [INFO][3991] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.125 [INFO][3991] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.125 [INFO][3991] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.126 [INFO][3991] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8 May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.127 [INFO][3991] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.130 [INFO][3991] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.131 [INFO][3991] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" host="localhost" May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.131 [INFO][3991] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:16.147661 env[1269]: 2025-05-15 10:44:16.131 [INFO][3991] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" HandleID="k8s-pod-network.42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.148356 env[1269]: 2025-05-15 10:44:16.132 [INFO][3979] cni-plugin/k8s.go 386: Populated endpoint ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Namespace="kube-system" Pod="coredns-668d6bf9bc-qznsj" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qznsj-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"b67a3be5-f48f-469c-afaa-fe33556ead05", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-qznsj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5daea2a087e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:16.148356 env[1269]: 2025-05-15 10:44:16.132 [INFO][3979] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Namespace="kube-system" Pod="coredns-668d6bf9bc-qznsj" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.148356 env[1269]: 2025-05-15 10:44:16.132 [INFO][3979] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5daea2a087e ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Namespace="kube-system" Pod="coredns-668d6bf9bc-qznsj" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.148356 env[1269]: 2025-05-15 10:44:16.136 [INFO][3979] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Namespace="kube-system" Pod="coredns-668d6bf9bc-qznsj" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.148356 env[1269]: 2025-05-15 10:44:16.138 [INFO][3979] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Namespace="kube-system" Pod="coredns-668d6bf9bc-qznsj" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qznsj-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"b67a3be5-f48f-469c-afaa-fe33556ead05", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8", Pod:"coredns-668d6bf9bc-qznsj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5daea2a087e", MAC:"5a:db:23:c6:ce:77", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:16.148356 env[1269]: 2025-05-15 10:44:16.145 [INFO][3979] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8" Namespace="kube-system" Pod="coredns-668d6bf9bc-qznsj" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:16.159020 env[1269]: time="2025-05-15T10:44:16.158974350Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:44:16.159020 env[1269]: time="2025-05-15T10:44:16.158999367Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:44:16.160260 env[1269]: time="2025-05-15T10:44:16.159008076Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:44:16.160260 env[1269]: time="2025-05-15T10:44:16.159221084Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8 pid=4018 runtime=io.containerd.runc.v2 May 15 10:44:16.168344 systemd[1]: Started cri-containerd-42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8.scope. May 15 10:44:16.177000 audit[4027]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4027 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:16.177000 audit[4027]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7ffd6be3b4c0 a2=0 a3=7ffd6be3b4ac items=0 ppid=3259 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.177000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:16.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.180000 audit: BPF prog-id=184 op=LOAD May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4018 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633931313536373965633937646137323033346436366532303737 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4018 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633931313536373965633937646137323033346436366532303737 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit: BPF prog-id=185 op=LOAD May 15 10:44:16.181000 audit[4026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000381d90 items=0 ppid=4018 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633931313536373965633937646137323033346436366532303737 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit: BPF prog-id=186 op=LOAD May 15 10:44:16.181000 audit[4026]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000381dd8 items=0 ppid=4018 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633931313536373965633937646137323033346436366532303737 May 15 10:44:16.181000 audit: BPF prog-id=186 op=UNLOAD May 15 10:44:16.181000 audit: BPF prog-id=185 op=UNLOAD May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { perfmon } for pid=4026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit[4026]: AVC avc: denied { bpf } for pid=4026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.181000 audit: BPF prog-id=187 op=LOAD May 15 10:44:16.181000 audit[4026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f21e8 items=0 ppid=4018 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432633931313536373965633937646137323033346436366532303737 May 15 10:44:16.185511 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:44:16.213998 env[1269]: time="2025-05-15T10:44:16.213968074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-qznsj,Uid:b67a3be5-f48f-469c-afaa-fe33556ead05,Namespace:kube-system,Attempt:1,} returns sandbox id \"42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8\"" May 15 10:44:16.220513 env[1269]: time="2025-05-15T10:44:16.220488737Z" level=info msg="CreateContainer within sandbox \"42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:44:16.235702 kubelet[2102]: I0515 10:44:16.235559 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-j2jp6" podStartSLOduration=33.235545249 podStartE2EDuration="33.235545249s" podCreationTimestamp="2025-05-15 10:43:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:44:16.194472076 +0000 UTC m=+37.369128028" watchObservedRunningTime="2025-05-15 10:44:16.235545249 +0000 UTC m=+37.410201205" May 15 10:44:16.279902 env[1269]: time="2025-05-15T10:44:16.279828082Z" level=info msg="CreateContainer within sandbox \"42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"45cb463722856b50b6527d428204f9def4560aba482a7fc11d318983d1a74d34\"" May 15 10:44:16.281880 env[1269]: time="2025-05-15T10:44:16.281854828Z" level=info msg="StartContainer for \"45cb463722856b50b6527d428204f9def4560aba482a7fc11d318983d1a74d34\"" May 15 10:44:16.291565 systemd[1]: Started cri-containerd-45cb463722856b50b6527d428204f9def4560aba482a7fc11d318983d1a74d34.scope. May 15 10:44:16.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.305000 audit: BPF prog-id=188 op=LOAD May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4018 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435636234363337323238353662353062363532376434323832303466 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=4018 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435636234363337323238353662353062363532376434323832303466 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit: BPF prog-id=189 op=LOAD May 15 10:44:16.306000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001eabe0 items=0 ppid=4018 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435636234363337323238353662353062363532376434323832303466 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit: BPF prog-id=190 op=LOAD May 15 10:44:16.306000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001eac28 items=0 ppid=4018 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435636234363337323238353662353062363532376434323832303466 May 15 10:44:16.306000 audit: BPF prog-id=190 op=UNLOAD May 15 10:44:16.306000 audit: BPF prog-id=189 op=UNLOAD May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:16.306000 audit: BPF prog-id=191 op=LOAD May 15 10:44:16.306000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001eb038 items=0 ppid=4018 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435636234363337323238353662353062363532376434323832303466 May 15 10:44:16.342391 env[1269]: time="2025-05-15T10:44:16.342360616Z" level=info msg="StartContainer for \"45cb463722856b50b6527d428204f9def4560aba482a7fc11d318983d1a74d34\" returns successfully" May 15 10:44:16.403000 audit[4074]: AVC avc: denied { getattr } for pid=4074 comm="coredns" path="cgroup:[4026532776]" dev="nsfs" ino=4026532776 scontext=system_u:system_r:svirt_lxc_net_t:s0:c405,c623 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 15 10:44:16.403000 audit[4074]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a9a8 a2=c0004ee6b8 a3=0 items=0 ppid=4018 pid=4074 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c405,c623 key=(null) May 15 10:44:16.403000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 15 10:44:16.428709 systemd[1]: run-netns-cni\x2d822ea9f9\x2d9f49\x2d1acb\x2d9aa7\x2db0a9971c107b.mount: Deactivated successfully. May 15 10:44:16.433000 audit[4093]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=4093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:16.433000 audit[4093]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcdd4fd070 a2=0 a3=7ffcdd4fd05c items=0 ppid=2232 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:16.437000 audit[4093]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:16.437000 audit[4093]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcdd4fd070 a2=0 a3=7ffcdd4fd05c items=0 ppid=2232 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:16.467000 audit[4095]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:16.467000 audit[4095]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd65095730 a2=0 a3=7ffd6509571c items=0 ppid=2232 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:16.472000 audit[4095]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4095 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:16.472000 audit[4095]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd65095730 a2=0 a3=7ffd6509571c items=0 ppid=2232 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:16.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:16.779185 systemd-networkd[1061]: cali2152ee20cb3: Gained IPv6LL May 15 10:44:16.999708 env[1269]: time="2025-05-15T10:44:16.999685237Z" level=info msg="StopPodSandbox for \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\"" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.090 [INFO][4110] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.090 [INFO][4110] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" iface="eth0" netns="/var/run/netns/cni-ec88f5a0-f5a7-6d1e-62f6-75d696c655c4" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.090 [INFO][4110] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" iface="eth0" netns="/var/run/netns/cni-ec88f5a0-f5a7-6d1e-62f6-75d696c655c4" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.090 [INFO][4110] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" iface="eth0" netns="/var/run/netns/cni-ec88f5a0-f5a7-6d1e-62f6-75d696c655c4" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.091 [INFO][4110] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.091 [INFO][4110] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.141 [INFO][4117] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.141 [INFO][4117] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.141 [INFO][4117] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.153 [WARNING][4117] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.153 [INFO][4117] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.157 [INFO][4117] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:17.160092 env[1269]: 2025-05-15 10:44:17.159 [INFO][4110] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:17.162127 systemd[1]: run-netns-cni\x2dec88f5a0\x2df5a7\x2d6d1e\x2d62f6\x2d75d696c655c4.mount: Deactivated successfully. May 15 10:44:17.162417 env[1269]: time="2025-05-15T10:44:17.162396281Z" level=info msg="TearDown network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\" successfully" May 15 10:44:17.162472 env[1269]: time="2025-05-15T10:44:17.162460094Z" level=info msg="StopPodSandbox for \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\" returns successfully" May 15 10:44:17.162930 env[1269]: time="2025-05-15T10:44:17.162917026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49d8bdc-n8crk,Uid:4877dea9-5148-4e17-852e-f380a1e02cd0,Namespace:calico-apiserver,Attempt:1,}" May 15 10:44:17.193661 kubelet[2102]: I0515 10:44:17.190726 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-qznsj" podStartSLOduration=34.190714446 podStartE2EDuration="34.190714446s" podCreationTimestamp="2025-05-15 10:43:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:44:17.190367702 +0000 UTC m=+38.365023658" watchObservedRunningTime="2025-05-15 10:44:17.190714446 +0000 UTC m=+38.365370400" May 15 10:44:17.291211 systemd-networkd[1061]: caliec6584a64ee: Gained IPv6LL May 15 10:44:17.328236 systemd-networkd[1061]: calie0b35378228: Link UP May 15 10:44:17.332335 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:44:17.332392 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie0b35378228: link becomes ready May 15 10:44:17.332463 systemd-networkd[1061]: calie0b35378228: Gained carrier May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.240 [INFO][4123] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0 calico-apiserver-d49d8bdc- calico-apiserver 4877dea9-5148-4e17-852e-f380a1e02cd0 783 0 2025-05-15 10:43:49 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:d49d8bdc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-d49d8bdc-n8crk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie0b35378228 [] []}} ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-n8crk" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.240 [INFO][4123] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-n8crk" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.268 [INFO][4136] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" HandleID="k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.284 [INFO][4136] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" HandleID="k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308ba0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-d49d8bdc-n8crk", "timestamp":"2025-05-15 10:44:17.268201605 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.284 [INFO][4136] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.284 [INFO][4136] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.284 [INFO][4136] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.292 [INFO][4136] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.297 [INFO][4136] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.309 [INFO][4136] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.311 [INFO][4136] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.313 [INFO][4136] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.313 [INFO][4136] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.313 [INFO][4136] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98 May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.320 [INFO][4136] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.324 [INFO][4136] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.324 [INFO][4136] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" host="localhost" May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.324 [INFO][4136] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:17.344236 env[1269]: 2025-05-15 10:44:17.324 [INFO][4136] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" HandleID="k8s-pod-network.aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.344686 env[1269]: 2025-05-15 10:44:17.325 [INFO][4123] cni-plugin/k8s.go 386: Populated endpoint ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-n8crk" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0", GenerateName:"calico-apiserver-d49d8bdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"4877dea9-5148-4e17-852e-f380a1e02cd0", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49d8bdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-d49d8bdc-n8crk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie0b35378228", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:17.344686 env[1269]: 2025-05-15 10:44:17.325 [INFO][4123] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-n8crk" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.344686 env[1269]: 2025-05-15 10:44:17.325 [INFO][4123] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie0b35378228 ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-n8crk" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.344686 env[1269]: 2025-05-15 10:44:17.332 [INFO][4123] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-n8crk" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.344686 env[1269]: 2025-05-15 10:44:17.333 [INFO][4123] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-n8crk" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0", GenerateName:"calico-apiserver-d49d8bdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"4877dea9-5148-4e17-852e-f380a1e02cd0", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49d8bdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98", Pod:"calico-apiserver-d49d8bdc-n8crk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie0b35378228", MAC:"c6:9e:c5:23:3d:14", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:17.344686 env[1269]: 2025-05-15 10:44:17.340 [INFO][4123] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98" Namespace="calico-apiserver" Pod="calico-apiserver-d49d8bdc-n8crk" WorkloadEndpoint="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:17.355219 systemd-networkd[1061]: cali5daea2a087e: Gained IPv6LL May 15 10:44:17.371065 kernel: kauditd_printk_skb: 466 callbacks suppressed May 15 10:44:17.371156 kernel: audit: type=1325 audit(1747305857.363:1271): table=filter:110 family=2 entries=56 op=nft_register_chain pid=4154 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:17.371185 kernel: audit: type=1300 audit(1747305857.363:1271): arch=c000003e syscall=46 success=yes exit=27932 a0=3 a1=7ffd34f6d0b0 a2=0 a3=7ffd34f6d09c items=0 ppid=3259 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.363000 audit[4154]: NETFILTER_CFG table=filter:110 family=2 entries=56 op=nft_register_chain pid=4154 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:44:17.363000 audit[4154]: SYSCALL arch=c000003e syscall=46 success=yes exit=27932 a0=3 a1=7ffd34f6d0b0 a2=0 a3=7ffd34f6d09c items=0 ppid=3259 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.363000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:17.374175 kernel: audit: type=1327 audit(1747305857.363:1271): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:44:17.392225 env[1269]: time="2025-05-15T10:44:17.392126790Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:44:17.392225 env[1269]: time="2025-05-15T10:44:17.392152807Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:44:17.392225 env[1269]: time="2025-05-15T10:44:17.392159693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:44:17.392346 env[1269]: time="2025-05-15T10:44:17.392241168Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98 pid=4163 runtime=io.containerd.runc.v2 May 15 10:44:17.417936 systemd[1]: Started cri-containerd-aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98.scope. May 15 10:44:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.447557 kernel: audit: type=1400 audit(1747305857.441:1272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.447591 kernel: audit: type=1400 audit(1747305857.441:1273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.447607 kernel: audit: type=1400 audit(1747305857.441:1274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.452376 kernel: audit: type=1400 audit(1747305857.441:1275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.454939 kernel: audit: type=1400 audit(1747305857.441:1276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.454967 kernel: audit: type=1400 audit(1747305857.441:1277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.460004 kernel: audit: type=1400 audit(1747305857.441:1278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.444000 audit: BPF prog-id=192 op=LOAD May 15 10:44:17.449000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4163 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373632333639396532383761633664343165353962383039346439 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4163 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373632333639396532383761633664343165353962383039346439 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.449000 audit: BPF prog-id=193 op=LOAD May 15 10:44:17.449000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000298670 items=0 ppid=4163 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373632333639396532383761633664343165353962383039346439 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.451000 audit: BPF prog-id=194 op=LOAD May 15 10:44:17.451000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002986b8 items=0 ppid=4163 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373632333639396532383761633664343165353962383039346439 May 15 10:44:17.456000 audit: BPF prog-id=194 op=UNLOAD May 15 10:44:17.456000 audit: BPF prog-id=193 op=UNLOAD May 15 10:44:17.456000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.456000 audit: BPF prog-id=195 op=LOAD May 15 10:44:17.456000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000298ac8 items=0 ppid=4163 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161373632333639396532383761633664343165353962383039346439 May 15 10:44:17.462117 systemd-resolved[1203]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:44:17.489625 env[1269]: time="2025-05-15T10:44:17.488114723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49d8bdc-n8crk,Uid:4877dea9-5148-4e17-852e-f380a1e02cd0,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98\"" May 15 10:44:17.517000 audit[4197]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:17.517000 audit[4197]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffff2ecfa40 a2=0 a3=7ffff2ecfa2c items=0 ppid=2232 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:17.552000 audit[4197]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:17.552000 audit[4197]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffff2ecfa40 a2=0 a3=7ffff2ecfa2c items=0 ppid=2232 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.552000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:17.725719 env[1269]: time="2025-05-15T10:44:17.725651663Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:17.727760 env[1269]: time="2025-05-15T10:44:17.727728689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:17.728693 env[1269]: time="2025-05-15T10:44:17.728676798Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:17.729492 env[1269]: time="2025-05-15T10:44:17.729475127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:17.729751 env[1269]: time="2025-05-15T10:44:17.729732080Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:44:17.731429 env[1269]: time="2025-05-15T10:44:17.730723022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:44:17.733227 env[1269]: time="2025-05-15T10:44:17.733206792Z" level=info msg="CreateContainer within sandbox \"34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:44:17.739893 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount735306621.mount: Deactivated successfully. May 15 10:44:17.751616 env[1269]: time="2025-05-15T10:44:17.751592383Z" level=info msg="CreateContainer within sandbox \"34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e5981426a4c6cd89c9b9e6e624df022673bdbe74e79b27fc8fb635219ac4ee3c\"" May 15 10:44:17.752022 env[1269]: time="2025-05-15T10:44:17.751991480Z" level=info msg="StartContainer for \"e5981426a4c6cd89c9b9e6e624df022673bdbe74e79b27fc8fb635219ac4ee3c\"" May 15 10:44:17.768821 systemd[1]: Started cri-containerd-e5981426a4c6cd89c9b9e6e624df022673bdbe74e79b27fc8fb635219ac4ee3c.scope. May 15 10:44:17.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit: BPF prog-id=196 op=LOAD May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3634 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393831343236613463366364383963396239653665363234646630 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3634 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393831343236613463366364383963396239653665363234646630 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit: BPF prog-id=197 op=LOAD May 15 10:44:17.782000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a24e0 items=0 ppid=3634 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393831343236613463366364383963396239653665363234646630 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit: BPF prog-id=198 op=LOAD May 15 10:44:17.782000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a2528 items=0 ppid=3634 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393831343236613463366364383963396239653665363234646630 May 15 10:44:17.782000 audit: BPF prog-id=198 op=UNLOAD May 15 10:44:17.782000 audit: BPF prog-id=197 op=UNLOAD May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:17.782000 audit: BPF prog-id=199 op=LOAD May 15 10:44:17.782000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2938 items=0 ppid=3634 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:17.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535393831343236613463366364383963396239653665363234646630 May 15 10:44:17.828701 env[1269]: time="2025-05-15T10:44:17.828668530Z" level=info msg="StartContainer for \"e5981426a4c6cd89c9b9e6e624df022673bdbe74e79b27fc8fb635219ac4ee3c\" returns successfully" May 15 10:44:18.249452 kubelet[2102]: I0515 10:44:18.249420 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-d49d8bdc-pcch5" podStartSLOduration=25.700455936 podStartE2EDuration="29.24940493s" podCreationTimestamp="2025-05-15 10:43:49 +0000 UTC" firstStartedPulling="2025-05-15 10:44:14.181439185 +0000 UTC m=+35.356095134" lastFinishedPulling="2025-05-15 10:44:17.730388177 +0000 UTC m=+38.905044128" observedRunningTime="2025-05-15 10:44:18.248919086 +0000 UTC m=+39.423575040" watchObservedRunningTime="2025-05-15 10:44:18.24940493 +0000 UTC m=+39.424060882" May 15 10:44:18.275000 audit[4218]: AVC avc: denied { watch } for pid=4218 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_44_00.3070075743/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c743 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c290,c743 tclass=file permissive=0 May 15 10:44:18.275000 audit[4218]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eaa8c0 a2=fc6 a3=0 items=0 ppid=3634 pid=4218 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c743 key=(null) May 15 10:44:18.275000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:44:18.426506 systemd[1]: run-containerd-runc-k8s.io-e5981426a4c6cd89c9b9e6e624df022673bdbe74e79b27fc8fb635219ac4ee3c-runc.oMsld9.mount: Deactivated successfully. May 15 10:44:18.566000 audit[4238]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:18.566000 audit[4238]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff3b3369d0 a2=0 a3=7fff3b3369bc items=0 ppid=2232 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:18.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:18.570000 audit[4238]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:18.570000 audit[4238]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff3b3369d0 a2=0 a3=7fff3b3369bc items=0 ppid=2232 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:18.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:18.763212 systemd-networkd[1061]: calie0b35378228: Gained IPv6LL May 15 10:44:19.215146 kubelet[2102]: I0515 10:44:19.212794 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:44:20.129409 env[1269]: time="2025-05-15T10:44:20.129382934Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:20.130790 env[1269]: time="2025-05-15T10:44:20.130770985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:20.131501 env[1269]: time="2025-05-15T10:44:20.131479877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:20.132699 env[1269]: time="2025-05-15T10:44:20.132684899Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:20.133405 env[1269]: time="2025-05-15T10:44:20.133341831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 10:44:20.135293 env[1269]: time="2025-05-15T10:44:20.135233278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:44:20.137158 env[1269]: time="2025-05-15T10:44:20.137142000Z" level=info msg="CreateContainer within sandbox \"f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:44:20.144886 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount771375341.mount: Deactivated successfully. May 15 10:44:20.147185 env[1269]: time="2025-05-15T10:44:20.147162862Z" level=info msg="CreateContainer within sandbox \"f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b7db8eed6b9494f4163976ad8f363f75ffc2a4726d9cc805e85b01fbbe8892f6\"" May 15 10:44:20.147564 env[1269]: time="2025-05-15T10:44:20.147550706Z" level=info msg="StartContainer for \"b7db8eed6b9494f4163976ad8f363f75ffc2a4726d9cc805e85b01fbbe8892f6\"" May 15 10:44:20.166372 systemd[1]: Started cri-containerd-b7db8eed6b9494f4163976ad8f363f75ffc2a4726d9cc805e85b01fbbe8892f6.scope. May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fe374bcb518 items=0 ppid=3532 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:20.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237646238656564366239343934663431363339373661643866333633 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit: BPF prog-id=200 op=LOAD May 15 10:44:20.180000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002d9d58 items=0 ppid=3532 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:20.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237646238656564366239343934663431363339373661643866333633 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit: BPF prog-id=201 op=LOAD May 15 10:44:20.180000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002d9da8 items=0 ppid=3532 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:20.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237646238656564366239343934663431363339373661643866333633 May 15 10:44:20.180000 audit: BPF prog-id=201 op=UNLOAD May 15 10:44:20.180000 audit: BPF prog-id=200 op=UNLOAD May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:20.180000 audit: BPF prog-id=202 op=LOAD May 15 10:44:20.180000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002d9e38 items=0 ppid=3532 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:20.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237646238656564366239343934663431363339373661643866333633 May 15 10:44:20.194571 env[1269]: time="2025-05-15T10:44:20.194546302Z" level=info msg="StartContainer for \"b7db8eed6b9494f4163976ad8f363f75ffc2a4726d9cc805e85b01fbbe8892f6\" returns successfully" May 15 10:44:21.142720 systemd[1]: run-containerd-runc-k8s.io-b7db8eed6b9494f4163976ad8f363f75ffc2a4726d9cc805e85b01fbbe8892f6-runc.81XjEZ.mount: Deactivated successfully. May 15 10:44:21.179291 kubelet[2102]: I0515 10:44:21.179270 2102 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:44:21.180553 kubelet[2102]: I0515 10:44:21.180543 2102 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:44:25.128326 env[1269]: time="2025-05-15T10:44:25.128295850Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:25.129590 env[1269]: time="2025-05-15T10:44:25.129567757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 10:44:25.130416 env[1269]: time="2025-05-15T10:44:25.130403072Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:25.130944 env[1269]: time="2025-05-15T10:44:25.130929055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:25.131627 env[1269]: time="2025-05-15T10:44:25.131610333Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:44:25.132777 env[1269]: time="2025-05-15T10:44:25.132759619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:25.165583 env[1269]: time="2025-05-15T10:44:25.165552876Z" level=info msg="CreateContainer within sandbox \"740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:44:25.194736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2203320518.mount: Deactivated successfully. May 15 10:44:25.196080 env[1269]: time="2025-05-15T10:44:25.196025099Z" level=info msg="CreateContainer within sandbox \"740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"573f947e341de9165b4bf5d475c648b6f4f161fcc6f3c2e7200653817b638866\"" May 15 10:44:25.196403 env[1269]: time="2025-05-15T10:44:25.196389135Z" level=info msg="StartContainer for \"573f947e341de9165b4bf5d475c648b6f4f161fcc6f3c2e7200653817b638866\"" May 15 10:44:25.212364 systemd[1]: Started cri-containerd-573f947e341de9165b4bf5d475c648b6f4f161fcc6f3c2e7200653817b638866.scope. May 15 10:44:25.226610 kernel: kauditd_printk_skb: 165 callbacks suppressed May 15 10:44:25.229069 kernel: audit: type=1400 audit(1747305865.224:1319): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.234673 kernel: audit: type=1400 audit(1747305865.224:1320): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.234724 kernel: audit: type=1400 audit(1747305865.224:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.237435 kernel: audit: type=1400 audit(1747305865.224:1322): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.242939 kernel: audit: type=1400 audit(1747305865.224:1323): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.248566 kernel: audit: type=1400 audit(1747305865.224:1324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.248602 kernel: audit: type=1400 audit(1747305865.224:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.255061 kernel: audit: type=1400 audit(1747305865.224:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.255102 kernel: audit: type=1400 audit(1747305865.224:1327): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.260023 kernel: audit: type=1400 audit(1747305865.226:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.226000 audit: BPF prog-id=203 op=LOAD May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3825 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336639343765333431646539313635623462663564343735633634 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3825 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336639343765333431646539313635623462663564343735633634 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit: BPF prog-id=204 op=LOAD May 15 10:44:25.228000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003846e0 items=0 ppid=3825 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336639343765333431646539313635623462663564343735633634 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit: BPF prog-id=205 op=LOAD May 15 10:44:25.228000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000384728 items=0 ppid=3825 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336639343765333431646539313635623462663564343735633634 May 15 10:44:25.228000 audit: BPF prog-id=205 op=UNLOAD May 15 10:44:25.228000 audit: BPF prog-id=204 op=UNLOAD May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { perfmon } for pid=4296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit[4296]: AVC avc: denied { bpf } for pid=4296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.228000 audit: BPF prog-id=206 op=LOAD May 15 10:44:25.228000 audit[4296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000384b38 items=0 ppid=3825 pid=4296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537336639343765333431646539313635623462663564343735633634 May 15 10:44:25.278544 env[1269]: time="2025-05-15T10:44:25.267659139Z" level=info msg="StartContainer for \"573f947e341de9165b4bf5d475c648b6f4f161fcc6f3c2e7200653817b638866\" returns successfully" May 15 10:44:25.585248 env[1269]: time="2025-05-15T10:44:25.585165188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:25.586405 env[1269]: time="2025-05-15T10:44:25.586388315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:25.587084 env[1269]: time="2025-05-15T10:44:25.587066432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:25.587849 env[1269]: time="2025-05-15T10:44:25.587837220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:25.588214 env[1269]: time="2025-05-15T10:44:25.588200441Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:44:25.590467 env[1269]: time="2025-05-15T10:44:25.590446022Z" level=info msg="CreateContainer within sandbox \"aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:44:25.626996 env[1269]: time="2025-05-15T10:44:25.626961279Z" level=info msg="CreateContainer within sandbox \"aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d3ab8c71fa4207d8ded9b0b242371fc5949a5a358e8e79070aac6c512755d588\"" May 15 10:44:25.627469 env[1269]: time="2025-05-15T10:44:25.627451626Z" level=info msg="StartContainer for \"d3ab8c71fa4207d8ded9b0b242371fc5949a5a358e8e79070aac6c512755d588\"" May 15 10:44:25.639244 systemd[1]: Started cri-containerd-d3ab8c71fa4207d8ded9b0b242371fc5949a5a358e8e79070aac6c512755d588.scope. May 15 10:44:25.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit: BPF prog-id=207 op=LOAD May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4163 pid=4332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616238633731666134323037643864656439623062323432333731 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4163 pid=4332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616238633731666134323037643864656439623062323432333731 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit: BPF prog-id=208 op=LOAD May 15 10:44:25.654000 audit[4332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1d10 items=0 ppid=4163 pid=4332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616238633731666134323037643864656439623062323432333731 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.654000 audit: BPF prog-id=209 op=LOAD May 15 10:44:25.654000 audit[4332]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d58 items=0 ppid=4163 pid=4332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616238633731666134323037643864656439623062323432333731 May 15 10:44:25.654000 audit: BPF prog-id=209 op=UNLOAD May 15 10:44:25.654000 audit: BPF prog-id=208 op=UNLOAD May 15 10:44:25.655000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { perfmon } for pid=4332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit[4332]: AVC avc: denied { bpf } for pid=4332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:25.655000 audit: BPF prog-id=210 op=LOAD May 15 10:44:25.655000 audit[4332]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca168 items=0 ppid=4163 pid=4332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:25.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433616238633731666134323037643864656439623062323432333731 May 15 10:44:25.687578 env[1269]: time="2025-05-15T10:44:25.687547215Z" level=info msg="StartContainer for \"d3ab8c71fa4207d8ded9b0b242371fc5949a5a358e8e79070aac6c512755d588\" returns successfully" May 15 10:44:26.374000 audit[4343]: AVC avc: denied { watch } for pid=4343 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_44_00.1760468798/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c737,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c737,c786 tclass=file permissive=0 May 15 10:44:26.374000 audit[4343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00133ab60 a2=fc6 a3=0 items=0 ppid=4163 pid=4343 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c737,c786 key=(null) May 15 10:44:26.374000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:44:27.293479 kubelet[2102]: I0515 10:44:27.255882 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bttzv" podStartSLOduration=31.877622623 podStartE2EDuration="38.255869008s" podCreationTimestamp="2025-05-15 10:43:49 +0000 UTC" firstStartedPulling="2025-05-15 10:44:13.756575808 +0000 UTC m=+34.931231756" lastFinishedPulling="2025-05-15 10:44:20.134822192 +0000 UTC m=+41.309478141" observedRunningTime="2025-05-15 10:44:21.213665826 +0000 UTC m=+42.388321780" watchObservedRunningTime="2025-05-15 10:44:27.255869008 +0000 UTC m=+48.430524962" May 15 10:44:27.295201 kubelet[2102]: I0515 10:44:27.294082 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-956fd76b-r2swt" podStartSLOduration=28.505165937 podStartE2EDuration="38.294067493s" podCreationTimestamp="2025-05-15 10:43:49 +0000 UTC" firstStartedPulling="2025-05-15 10:44:15.342264882 +0000 UTC m=+36.516920834" lastFinishedPulling="2025-05-15 10:44:25.131166442 +0000 UTC m=+46.305822390" observedRunningTime="2025-05-15 10:44:27.253688417 +0000 UTC m=+48.428344377" watchObservedRunningTime="2025-05-15 10:44:27.294067493 +0000 UTC m=+48.468723450" May 15 10:44:27.307752 kubelet[2102]: I0515 10:44:27.307706 2102 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-d49d8bdc-n8crk" podStartSLOduration=30.207827511 podStartE2EDuration="38.307695039s" podCreationTimestamp="2025-05-15 10:43:49 +0000 UTC" firstStartedPulling="2025-05-15 10:44:17.48879992 +0000 UTC m=+38.663455868" lastFinishedPulling="2025-05-15 10:44:25.588667447 +0000 UTC m=+46.763323396" observedRunningTime="2025-05-15 10:44:27.294562053 +0000 UTC m=+48.469218006" watchObservedRunningTime="2025-05-15 10:44:27.307695039 +0000 UTC m=+48.482350994" May 15 10:44:27.317000 audit[4364]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:27.317000 audit[4364]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc4f137490 a2=0 a3=7ffc4f13747c items=0 ppid=2232 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:27.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:27.324000 audit[4364]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:27.324000 audit[4364]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc4f137490 a2=0 a3=7ffc4f13747c items=0 ppid=2232 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:27.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:27.332000 audit[4366]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:27.332000 audit[4366]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcc18c63d0 a2=0 a3=7ffcc18c63bc items=0 ppid=2232 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:27.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:27.337000 audit[4366]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:27.337000 audit[4366]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcc18c63d0 a2=0 a3=7ffcc18c63bc items=0 ppid=2232 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:27.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:27.586005 systemd[1]: run-containerd-runc-k8s.io-573f947e341de9165b4bf5d475c648b6f4f161fcc6f3c2e7200653817b638866-runc.ecXab8.mount: Deactivated successfully. May 15 10:44:34.048258 kubelet[2102]: I0515 10:44:34.046202 2102 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:44:34.087000 audit[4398]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:34.089782 kernel: kauditd_printk_skb: 119 callbacks suppressed May 15 10:44:34.090152 kernel: audit: type=1325 audit(1747305874.087:1360): table=filter:119 family=2 entries=8 op=nft_register_rule pid=4398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:34.087000 audit[4398]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd7901a180 a2=0 a3=7ffd7901a16c items=0 ppid=2232 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:34.095463 kernel: audit: type=1300 audit(1747305874.087:1360): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd7901a180 a2=0 a3=7ffd7901a16c items=0 ppid=2232 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:34.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:34.097862 kernel: audit: type=1327 audit(1747305874.087:1360): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:34.098000 audit[4398]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:34.098000 audit[4398]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd7901a180 a2=0 a3=7ffd7901a16c items=0 ppid=2232 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:34.106967 kernel: audit: type=1325 audit(1747305874.098:1361): table=nat:120 family=2 entries=34 op=nft_register_chain pid=4398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:34.107068 kernel: audit: type=1300 audit(1747305874.098:1361): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd7901a180 a2=0 a3=7ffd7901a16c items=0 ppid=2232 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:34.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:34.110043 kernel: audit: type=1327 audit(1747305874.098:1361): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:34.116000 audit[4400]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:34.116000 audit[4400]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe90b46810 a2=0 a3=7ffe90b467fc items=0 ppid=2232 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:34.123641 kernel: audit: type=1325 audit(1747305874.116:1362): table=filter:121 family=2 entries=8 op=nft_register_rule pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:34.123709 kernel: audit: type=1300 audit(1747305874.116:1362): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe90b46810 a2=0 a3=7ffe90b467fc items=0 ppid=2232 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:34.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:34.125838 kernel: audit: type=1327 audit(1747305874.116:1362): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:34.126122 kernel: audit: type=1325 audit(1747305874.123:1363): table=nat:122 family=2 entries=34 op=nft_unregister_chain pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:34.123000 audit[4400]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_unregister_chain pid=4400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:34.123000 audit[4400]: SYSCALL arch=c000003e syscall=46 success=yes exit=9476 a0=3 a1=7ffe90b46810 a2=0 a3=7ffe90b467fc items=0 ppid=2232 pid=4400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:34.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:34.360000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:34.360000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00208eb40 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:44:34.360000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:44:34.373000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:34.373000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015a5e90 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:44:34.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:44:35.064000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:35.064000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0095d9bc0 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:44:35.064000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:44:35.064000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:35.064000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0096cda40 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:44:35.064000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:44:35.075000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:35.075000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c004fbcf00 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:44:35.075000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:44:35.075000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:35.075000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0095d9cb0 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:44:35.075000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:44:35.081000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:35.081000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c004fbcf40 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:44:35.081000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:44:35.093000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:35.093000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0095d9d10 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:44:35.093000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:44:35.133000 audit[4402]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=4402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:35.133000 audit[4402]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca0f22560 a2=0 a3=7ffca0f2254c items=0 ppid=2232 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:35.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:35.137000 audit[4402]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=4402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:35.137000 audit[4402]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffca0f22560 a2=0 a3=7ffca0f2254c items=0 ppid=2232 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:35.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:38.159581 systemd[1]: run-containerd-runc-k8s.io-75720a6c78d07c71475b8d793394883ad306fb78c5da3209f76ef3ed4794be27-runc.PwiOdG.mount: Deactivated successfully. May 15 10:44:38.913000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:38.913000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225b060 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:44:38.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:44:38.925000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:38.925000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00225b1e0 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:44:38.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:44:38.925000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:38.925000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028b8840 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:44:38.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:44:38.925000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:44:38.925000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028b8860 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:44:38.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:44:39.079501 env[1269]: time="2025-05-15T10:44:39.079180087Z" level=info msg="StopPodSandbox for \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\"" May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:39.637 [WARNING][4444] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--bttzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a", Pod:"csi-node-driver-bttzv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali15a4390f008", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:39.640 [INFO][4444] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:39.640 [INFO][4444] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" iface="eth0" netns="" May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:39.640 [INFO][4444] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:39.640 [INFO][4444] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:40.033 [INFO][4451] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:40.035 [INFO][4451] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:40.035 [INFO][4451] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:40.047 [WARNING][4451] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:40.047 [INFO][4451] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:40.048 [INFO][4451] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.051406 env[1269]: 2025-05-15 10:44:40.050 [INFO][4444] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:40.054798 env[1269]: time="2025-05-15T10:44:40.051692636Z" level=info msg="TearDown network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\" successfully" May 15 10:44:40.054798 env[1269]: time="2025-05-15T10:44:40.051714135Z" level=info msg="StopPodSandbox for \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\" returns successfully" May 15 10:44:40.102484 env[1269]: time="2025-05-15T10:44:40.102455197Z" level=info msg="RemovePodSandbox for \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\"" May 15 10:44:40.102829 env[1269]: time="2025-05-15T10:44:40.102793615Z" level=info msg="Forcibly stopping sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\"" May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.130 [WARNING][4471] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--bttzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8fbc89e8-a6f4-4e00-a09c-5ee0d9d4e9e8", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f16bc56b67486b1d884d53eefef11621322aabab2d002e635552d6f021c5417a", Pod:"csi-node-driver-bttzv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali15a4390f008", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.131 [INFO][4471] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.131 [INFO][4471] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" iface="eth0" netns="" May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.131 [INFO][4471] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.131 [INFO][4471] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.151 [INFO][4478] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.151 [INFO][4478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.151 [INFO][4478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.155 [WARNING][4478] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.155 [INFO][4478] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" HandleID="k8s-pod-network.1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" Workload="localhost-k8s-csi--node--driver--bttzv-eth0" May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.156 [INFO][4478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.159774 env[1269]: 2025-05-15 10:44:40.158 [INFO][4471] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38" May 15 10:44:40.175423 env[1269]: time="2025-05-15T10:44:40.159791347Z" level=info msg="TearDown network for sandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\" successfully" May 15 10:44:40.191139 env[1269]: time="2025-05-15T10:44:40.191097476Z" level=info msg="RemovePodSandbox \"1535d784aa5eb0174342157234fda6d940aa6694dccda800ad6119361691cf38\" returns successfully" May 15 10:44:40.191552 env[1269]: time="2025-05-15T10:44:40.191538960Z" level=info msg="StopPodSandbox for \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\"" May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.222 [WARNING][4496] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0", GenerateName:"calico-kube-controllers-956fd76b-", Namespace:"calico-system", SelfLink:"", UID:"07ce99d3-3b9a-4a97-be21-c81199d9e00b", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"956fd76b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66", Pod:"calico-kube-controllers-956fd76b-r2swt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliec6584a64ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.222 [INFO][4496] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.222 [INFO][4496] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" iface="eth0" netns="" May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.222 [INFO][4496] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.222 [INFO][4496] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.243 [INFO][4503] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.243 [INFO][4503] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.243 [INFO][4503] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.247 [WARNING][4503] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.247 [INFO][4503] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.248 [INFO][4503] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.250527 env[1269]: 2025-05-15 10:44:40.249 [INFO][4496] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:40.265564 env[1269]: time="2025-05-15T10:44:40.250796529Z" level=info msg="TearDown network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\" successfully" May 15 10:44:40.265564 env[1269]: time="2025-05-15T10:44:40.250816935Z" level=info msg="StopPodSandbox for \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\" returns successfully" May 15 10:44:40.265564 env[1269]: time="2025-05-15T10:44:40.251117870Z" level=info msg="RemovePodSandbox for \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\"" May 15 10:44:40.265564 env[1269]: time="2025-05-15T10:44:40.251134103Z" level=info msg="Forcibly stopping sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\"" May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.308 [WARNING][4521] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0", GenerateName:"calico-kube-controllers-956fd76b-", Namespace:"calico-system", SelfLink:"", UID:"07ce99d3-3b9a-4a97-be21-c81199d9e00b", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"956fd76b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"740048fdeb3769b040c64a2c005e5cbcf26964b6618c36353578cc9293a7fd66", Pod:"calico-kube-controllers-956fd76b-r2swt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliec6584a64ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.308 [INFO][4521] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.308 [INFO][4521] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" iface="eth0" netns="" May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.308 [INFO][4521] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.308 [INFO][4521] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.333 [INFO][4528] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.333 [INFO][4528] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.333 [INFO][4528] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.339 [WARNING][4528] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.339 [INFO][4528] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" HandleID="k8s-pod-network.5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" Workload="localhost-k8s-calico--kube--controllers--956fd76b--r2swt-eth0" May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.340 [INFO][4528] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.344387 env[1269]: 2025-05-15 10:44:40.343 [INFO][4521] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6" May 15 10:44:40.345512 env[1269]: time="2025-05-15T10:44:40.345491356Z" level=info msg="TearDown network for sandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\" successfully" May 15 10:44:40.388470 env[1269]: time="2025-05-15T10:44:40.388444989Z" level=info msg="RemovePodSandbox \"5a208fc582815bf4d93fffb62d32342e9f087db9d1af09b3e64545c53ca137f6\" returns successfully" May 15 10:44:40.388930 env[1269]: time="2025-05-15T10:44:40.388916926Z" level=info msg="StopPodSandbox for \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\"" May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.470 [WARNING][4547] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c76e5f8c-48a4-445b-9d75-a7928050f62f", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea", Pod:"coredns-668d6bf9bc-j2jp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2152ee20cb3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.471 [INFO][4547] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.471 [INFO][4547] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" iface="eth0" netns="" May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.471 [INFO][4547] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.471 [INFO][4547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.485 [INFO][4554] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.485 [INFO][4554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.485 [INFO][4554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.491 [WARNING][4554] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.491 [INFO][4554] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.492 [INFO][4554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.495716 env[1269]: 2025-05-15 10:44:40.493 [INFO][4547] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:40.504083 env[1269]: time="2025-05-15T10:44:40.496191034Z" level=info msg="TearDown network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\" successfully" May 15 10:44:40.504083 env[1269]: time="2025-05-15T10:44:40.496218149Z" level=info msg="StopPodSandbox for \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\" returns successfully" May 15 10:44:40.504961 env[1269]: time="2025-05-15T10:44:40.504289093Z" level=info msg="RemovePodSandbox for \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\"" May 15 10:44:40.504961 env[1269]: time="2025-05-15T10:44:40.504312838Z" level=info msg="Forcibly stopping sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\"" May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.538 [WARNING][4573] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"c76e5f8c-48a4-445b-9d75-a7928050f62f", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bface91e70531871026197aead691ff8d222dfe62ac5787d12fbb1847a5f5eea", Pod:"coredns-668d6bf9bc-j2jp6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2152ee20cb3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.538 [INFO][4573] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.538 [INFO][4573] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" iface="eth0" netns="" May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.538 [INFO][4573] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.538 [INFO][4573] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.563 [INFO][4581] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.563 [INFO][4581] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.563 [INFO][4581] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.568 [WARNING][4581] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.568 [INFO][4581] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" HandleID="k8s-pod-network.3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" Workload="localhost-k8s-coredns--668d6bf9bc--j2jp6-eth0" May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.568 [INFO][4581] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.571126 env[1269]: 2025-05-15 10:44:40.569 [INFO][4573] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f" May 15 10:44:40.582107 env[1269]: time="2025-05-15T10:44:40.571417272Z" level=info msg="TearDown network for sandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\" successfully" May 15 10:44:40.591158 env[1269]: time="2025-05-15T10:44:40.591135115Z" level=info msg="RemovePodSandbox \"3d6dd066bfdf1bb14befb63cdcc3504a74ede2bc4a60677a20b96461a9d0f74f\" returns successfully" May 15 10:44:40.591533 env[1269]: time="2025-05-15T10:44:40.591519390Z" level=info msg="StopPodSandbox for \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\"" May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.618 [WARNING][4599] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0", GenerateName:"calico-apiserver-d49d8bdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"c7dc7561-18b0-4ced-b105-6e410668e1a9", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49d8bdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f", Pod:"calico-apiserver-d49d8bdc-pcch5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9b9fc9126e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.618 [INFO][4599] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.618 [INFO][4599] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" iface="eth0" netns="" May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.618 [INFO][4599] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.618 [INFO][4599] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.634 [INFO][4607] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.634 [INFO][4607] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.634 [INFO][4607] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.640 [WARNING][4607] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.640 [INFO][4607] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.641 [INFO][4607] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.646505 env[1269]: 2025-05-15 10:44:40.642 [INFO][4599] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:40.648978 env[1269]: time="2025-05-15T10:44:40.648072722Z" level=info msg="TearDown network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\" successfully" May 15 10:44:40.648978 env[1269]: time="2025-05-15T10:44:40.648096207Z" level=info msg="StopPodSandbox for \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\" returns successfully" May 15 10:44:40.648978 env[1269]: time="2025-05-15T10:44:40.648379952Z" level=info msg="RemovePodSandbox for \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\"" May 15 10:44:40.648978 env[1269]: time="2025-05-15T10:44:40.648398213Z" level=info msg="Forcibly stopping sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\"" May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.682 [WARNING][4626] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0", GenerateName:"calico-apiserver-d49d8bdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"c7dc7561-18b0-4ced-b105-6e410668e1a9", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49d8bdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"34d47268081937aa5e6b913ffe9174ee13c8ecb94d63a6b845bf05153ff37d6f", Pod:"calico-apiserver-d49d8bdc-pcch5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9b9fc9126e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.682 [INFO][4626] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.682 [INFO][4626] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" iface="eth0" netns="" May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.682 [INFO][4626] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.682 [INFO][4626] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.699 [INFO][4633] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.699 [INFO][4633] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.699 [INFO][4633] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.708 [WARNING][4633] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.708 [INFO][4633] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" HandleID="k8s-pod-network.da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" Workload="localhost-k8s-calico--apiserver--d49d8bdc--pcch5-eth0" May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.711 [INFO][4633] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.713723 env[1269]: 2025-05-15 10:44:40.712 [INFO][4626] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30" May 15 10:44:40.716850 env[1269]: time="2025-05-15T10:44:40.713740679Z" level=info msg="TearDown network for sandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\" successfully" May 15 10:44:40.716850 env[1269]: time="2025-05-15T10:44:40.716803091Z" level=info msg="RemovePodSandbox \"da2803d833beb37e028f5b6f2e18d505c83ebdb1cceb21219c90367a8024ac30\" returns successfully" May 15 10:44:40.717146 env[1269]: time="2025-05-15T10:44:40.717131624Z" level=info msg="StopPodSandbox for \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\"" May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.756 [WARNING][4653] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0", GenerateName:"calico-apiserver-d49d8bdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"4877dea9-5148-4e17-852e-f380a1e02cd0", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49d8bdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98", Pod:"calico-apiserver-d49d8bdc-n8crk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie0b35378228", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.756 [INFO][4653] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.756 [INFO][4653] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" iface="eth0" netns="" May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.756 [INFO][4653] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.756 [INFO][4653] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.780 [INFO][4660] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.780 [INFO][4660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.780 [INFO][4660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.789 [WARNING][4660] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.789 [INFO][4660] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.790 [INFO][4660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.794318 env[1269]: 2025-05-15 10:44:40.793 [INFO][4653] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:40.794777 env[1269]: time="2025-05-15T10:44:40.794756425Z" level=info msg="TearDown network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\" successfully" May 15 10:44:40.794832 env[1269]: time="2025-05-15T10:44:40.794820190Z" level=info msg="StopPodSandbox for \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\" returns successfully" May 15 10:44:40.798220 env[1269]: time="2025-05-15T10:44:40.795192472Z" level=info msg="RemovePodSandbox for \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\"" May 15 10:44:40.798220 env[1269]: time="2025-05-15T10:44:40.795210189Z" level=info msg="Forcibly stopping sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\"" May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.831 [WARNING][4680] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0", GenerateName:"calico-apiserver-d49d8bdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"4877dea9-5148-4e17-852e-f380a1e02cd0", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49d8bdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aa7623699e287ac6d41e59b8094d9ebb3d16a229d28a0a790b5f0b683cb68b98", Pod:"calico-apiserver-d49d8bdc-n8crk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie0b35378228", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.831 [INFO][4680] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.831 [INFO][4680] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" iface="eth0" netns="" May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.831 [INFO][4680] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.831 [INFO][4680] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.859 [INFO][4687] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.859 [INFO][4687] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.859 [INFO][4687] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.862 [WARNING][4687] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.862 [INFO][4687] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" HandleID="k8s-pod-network.9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" Workload="localhost-k8s-calico--apiserver--d49d8bdc--n8crk-eth0" May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.863 [INFO][4687] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.865999 env[1269]: 2025-05-15 10:44:40.864 [INFO][4680] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f" May 15 10:44:40.874128 env[1269]: time="2025-05-15T10:44:40.866287094Z" level=info msg="TearDown network for sandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\" successfully" May 15 10:44:40.902784 env[1269]: time="2025-05-15T10:44:40.902728576Z" level=info msg="RemovePodSandbox \"9d2c891eca9eea9f916b40552298bf0c046341e45d75688ab62bd93e8b272c0f\" returns successfully" May 15 10:44:40.903866 env[1269]: time="2025-05-15T10:44:40.903849348Z" level=info msg="StopPodSandbox for \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\"" May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.929 [WARNING][4705] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qznsj-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"b67a3be5-f48f-469c-afaa-fe33556ead05", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8", Pod:"coredns-668d6bf9bc-qznsj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5daea2a087e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.929 [INFO][4705] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.929 [INFO][4705] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" iface="eth0" netns="" May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.929 [INFO][4705] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.929 [INFO][4705] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.950 [INFO][4713] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.950 [INFO][4713] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.950 [INFO][4713] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.955 [WARNING][4713] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.955 [INFO][4713] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.955 [INFO][4713] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:40.958413 env[1269]: 2025-05-15 10:44:40.957 [INFO][4705] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:40.959517 env[1269]: time="2025-05-15T10:44:40.958438920Z" level=info msg="TearDown network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\" successfully" May 15 10:44:40.959517 env[1269]: time="2025-05-15T10:44:40.958464551Z" level=info msg="StopPodSandbox for \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\" returns successfully" May 15 10:44:40.959517 env[1269]: time="2025-05-15T10:44:40.958823603Z" level=info msg="RemovePodSandbox for \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\"" May 15 10:44:40.959517 env[1269]: time="2025-05-15T10:44:40.958842413Z" level=info msg="Forcibly stopping sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\"" May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:40.985 [WARNING][4732] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--qznsj-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"b67a3be5-f48f-469c-afaa-fe33556ead05", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 43, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"42c9115679ec97da72034d66e2077bc21e719b7cfeccaaa413fd02d3b93e18c8", Pod:"coredns-668d6bf9bc-qznsj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5daea2a087e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:40.985 [INFO][4732] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:40.985 [INFO][4732] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" iface="eth0" netns="" May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:40.985 [INFO][4732] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:40.985 [INFO][4732] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:41.006 [INFO][4739] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:41.006 [INFO][4739] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:41.006 [INFO][4739] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:41.009 [WARNING][4739] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:41.009 [INFO][4739] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" HandleID="k8s-pod-network.9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" Workload="localhost-k8s-coredns--668d6bf9bc--qznsj-eth0" May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:41.010 [INFO][4739] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:44:41.012832 env[1269]: 2025-05-15 10:44:41.011 [INFO][4732] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf" May 15 10:44:41.017201 env[1269]: time="2025-05-15T10:44:41.013100864Z" level=info msg="TearDown network for sandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\" successfully" May 15 10:44:41.018311 env[1269]: time="2025-05-15T10:44:41.018294727Z" level=info msg="RemovePodSandbox \"9b629d07aa4b9ac13fde2c6b27e5cbe097e447b7c2a77805d985a9d295af93bf\" returns successfully" May 15 10:44:53.766643 systemd[1]: Started sshd@8-139.178.70.100:22-147.75.109.163:41980.service. May 15 10:44:53.778493 kernel: kauditd_printk_skb: 44 callbacks suppressed May 15 10:44:53.780243 kernel: audit: type=1130 audit(1747305893.768:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-147.75.109.163:41980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:53.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-147.75.109.163:41980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:53.889000 audit[4762]: USER_ACCT pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.891964 sshd[4762]: Accepted publickey for core from 147.75.109.163 port 41980 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:53.895795 kernel: audit: type=1101 audit(1747305893.889:1379): pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.895846 kernel: audit: type=1103 audit(1747305893.894:1380): pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.894000 audit[4762]: CRED_ACQ pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.900634 kernel: audit: type=1006 audit(1747305893.894:1381): pid=4762 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 10:44:53.904538 kernel: audit: type=1300 audit(1747305893.894:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc257a40f0 a2=3 a3=0 items=0 ppid=1 pid=4762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.904574 kernel: audit: type=1327 audit(1747305893.894:1381): proctitle=737368643A20636F7265205B707269765D May 15 10:44:53.894000 audit[4762]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc257a40f0 a2=3 a3=0 items=0 ppid=1 pid=4762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.894000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:44:53.905357 sshd[4762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:53.952848 systemd[1]: Started session-10.scope. May 15 10:44:53.953132 systemd-logind[1240]: New session 10 of user core. May 15 10:44:53.955000 audit[4762]: USER_START pid=4762 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.956000 audit[4764]: CRED_ACQ pid=4764 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.963513 kernel: audit: type=1105 audit(1747305893.955:1382): pid=4762 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.963560 kernel: audit: type=1103 audit(1747305893.956:1383): pid=4764 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:54.498369 sshd[4762]: pam_unix(sshd:session): session closed for user core May 15 10:44:54.497000 audit[4762]: USER_END pid=4762 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:54.497000 audit[4762]: CRED_DISP pid=4762 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:54.503527 systemd[1]: sshd@8-139.178.70.100:22-147.75.109.163:41980.service: Deactivated successfully. May 15 10:44:54.506652 kernel: audit: type=1106 audit(1747305894.497:1384): pid=4762 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:54.506698 kernel: audit: type=1104 audit(1747305894.497:1385): pid=4762 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:54.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-147.75.109.163:41980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:54.505782 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:44:54.506233 systemd-logind[1240]: Session 10 logged out. Waiting for processes to exit. May 15 10:44:54.506912 systemd-logind[1240]: Removed session 10. May 15 10:44:59.505653 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:44:59.505731 kernel: audit: type=1130 audit(1747305899.500:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-147.75.109.163:48300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:59.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-147.75.109.163:48300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:59.501835 systemd[1]: Started sshd@9-139.178.70.100:22-147.75.109.163:48300.service. May 15 10:44:59.562000 audit[4797]: USER_ACCT pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.564316 sshd[4797]: Accepted publickey for core from 147.75.109.163 port 48300 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:59.565000 audit[4797]: CRED_ACQ pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.567869 sshd[4797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:59.570311 kernel: audit: type=1101 audit(1747305899.562:1388): pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.570433 kernel: audit: type=1103 audit(1747305899.565:1389): pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.572508 kernel: audit: type=1006 audit(1747305899.566:1390): pid=4797 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 10:44:59.573633 kernel: audit: type=1300 audit(1747305899.566:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0dea5730 a2=3 a3=0 items=0 ppid=1 pid=4797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.566000 audit[4797]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0dea5730 a2=3 a3=0 items=0 ppid=1 pid=4797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.566000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:44:59.577787 kernel: audit: type=1327 audit(1747305899.566:1390): proctitle=737368643A20636F7265205B707269765D May 15 10:44:59.579689 systemd[1]: Started session-11.scope. May 15 10:44:59.579885 systemd-logind[1240]: New session 11 of user core. May 15 10:44:59.582000 audit[4797]: USER_START pid=4797 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.586000 audit[4799]: CRED_ACQ pid=4799 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.593537 kernel: audit: type=1105 audit(1747305899.582:1391): pid=4797 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.593624 kernel: audit: type=1103 audit(1747305899.586:1392): pid=4799 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.821173 sshd[4797]: pam_unix(sshd:session): session closed for user core May 15 10:44:59.820000 audit[4797]: USER_END pid=4797 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.825000 audit[4797]: CRED_DISP pid=4797 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.828646 kernel: audit: type=1106 audit(1747305899.820:1393): pid=4797 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.828708 kernel: audit: type=1104 audit(1747305899.825:1394): pid=4797 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:59.830833 systemd-logind[1240]: Session 11 logged out. Waiting for processes to exit. May 15 10:44:59.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-147.75.109.163:48300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:59.831055 systemd[1]: sshd@9-139.178.70.100:22-147.75.109.163:48300.service: Deactivated successfully. May 15 10:44:59.831544 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:44:59.832516 systemd-logind[1240]: Removed session 11. May 15 10:45:00.445668 update_engine[1241]: I0515 10:45:00.444988 1241 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 15 10:45:00.445959 update_engine[1241]: I0515 10:45:00.445681 1241 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 15 10:45:00.449885 update_engine[1241]: I0515 10:45:00.449864 1241 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 15 10:45:00.450950 update_engine[1241]: I0515 10:45:00.450932 1241 omaha_request_params.cc:62] Current group set to lts May 15 10:45:00.456008 update_engine[1241]: I0515 10:45:00.455991 1241 update_attempter.cc:499] Already updated boot flags. Skipping. May 15 10:45:00.456008 update_engine[1241]: I0515 10:45:00.456001 1241 update_attempter.cc:643] Scheduling an action processor start. May 15 10:45:00.457248 update_engine[1241]: I0515 10:45:00.456017 1241 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 15 10:45:00.458804 update_engine[1241]: I0515 10:45:00.458782 1241 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 15 10:45:00.458922 update_engine[1241]: I0515 10:45:00.458848 1241 omaha_request_action.cc:270] Posting an Omaha request to disabled May 15 10:45:00.458922 update_engine[1241]: I0515 10:45:00.458855 1241 omaha_request_action.cc:271] Request: May 15 10:45:00.458922 update_engine[1241]: May 15 10:45:00.458922 update_engine[1241]: May 15 10:45:00.458922 update_engine[1241]: May 15 10:45:00.458922 update_engine[1241]: May 15 10:45:00.458922 update_engine[1241]: May 15 10:45:00.458922 update_engine[1241]: May 15 10:45:00.458922 update_engine[1241]: May 15 10:45:00.458922 update_engine[1241]: May 15 10:45:00.458922 update_engine[1241]: I0515 10:45:00.458860 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 10:45:00.467757 update_engine[1241]: I0515 10:45:00.467738 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 10:45:00.468622 update_engine[1241]: E0515 10:45:00.467809 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 10:45:00.468622 update_engine[1241]: I0515 10:45:00.467855 1241 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 15 10:45:00.486305 locksmithd[1296]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 15 10:45:04.825653 systemd[1]: Started sshd@10-139.178.70.100:22-147.75.109.163:48310.service. May 15 10:45:04.835694 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:45:04.835736 kernel: audit: type=1130 audit(1747305904.824:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.100:22-147.75.109.163:48310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:04.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.100:22-147.75.109.163:48310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:04.897000 audit[4809]: USER_ACCT pid=4809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:04.911836 kernel: audit: type=1101 audit(1747305904.897:1397): pid=4809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:04.916152 kernel: audit: type=1103 audit(1747305904.901:1398): pid=4809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:04.916196 kernel: audit: type=1006 audit(1747305904.901:1399): pid=4809 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 15 10:45:04.916215 kernel: audit: type=1300 audit(1747305904.901:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3cd1d20 a2=3 a3=0 items=0 ppid=1 pid=4809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:04.916230 kernel: audit: type=1327 audit(1747305904.901:1399): proctitle=737368643A20636F7265205B707269765D May 15 10:45:04.901000 audit[4809]: CRED_ACQ pid=4809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:04.901000 audit[4809]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3cd1d20 a2=3 a3=0 items=0 ppid=1 pid=4809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:04.927146 kernel: audit: type=1105 audit(1747305904.917:1400): pid=4809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:04.927189 kernel: audit: type=1103 audit(1747305904.921:1401): pid=4811 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:04.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:04.917000 audit[4809]: USER_START pid=4809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:04.921000 audit[4811]: CRED_ACQ pid=4811 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:04.934225 sshd[4809]: Accepted publickey for core from 147.75.109.163 port 48310 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:04.902538 sshd[4809]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:04.914062 systemd[1]: Started session-12.scope. May 15 10:45:04.914234 systemd-logind[1240]: New session 12 of user core. May 15 10:45:05.099113 sshd[4809]: pam_unix(sshd:session): session closed for user core May 15 10:45:05.101000 audit[4809]: USER_END pid=4809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:05.103346 systemd[1]: sshd@10-139.178.70.100:22-147.75.109.163:48310.service: Deactivated successfully. May 15 10:45:05.103835 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:45:05.106144 kernel: audit: type=1106 audit(1747305905.101:1402): pid=4809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:05.106259 kernel: audit: type=1104 audit(1747305905.101:1403): pid=4809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:05.101000 audit[4809]: CRED_DISP pid=4809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:05.109297 systemd-logind[1240]: Session 12 logged out. Waiting for processes to exit. May 15 10:45:05.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.100:22-147.75.109.163:48310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:05.109808 systemd-logind[1240]: Removed session 12. May 15 10:45:08.151540 systemd[1]: run-containerd-runc-k8s.io-75720a6c78d07c71475b8d793394883ad306fb78c5da3209f76ef3ed4794be27-runc.qU71v1.mount: Deactivated successfully. May 15 10:45:09.767351 systemd[1]: run-containerd-runc-k8s.io-573f947e341de9165b4bf5d475c648b6f4f161fcc6f3c2e7200653817b638866-runc.4xHU0l.mount: Deactivated successfully. May 15 10:45:10.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.100:22-147.75.109.163:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:10.100825 systemd[1]: Started sshd@11-139.178.70.100:22-147.75.109.163:59022.service. May 15 10:45:10.101674 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:45:10.101714 kernel: audit: type=1130 audit(1747305910.099:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.100:22-147.75.109.163:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:10.400430 update_engine[1241]: I0515 10:45:10.400089 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 10:45:10.400430 update_engine[1241]: I0515 10:45:10.400297 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 10:45:10.400430 update_engine[1241]: E0515 10:45:10.400358 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 10:45:10.400430 update_engine[1241]: I0515 10:45:10.400406 1241 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 15 10:45:10.493000 audit[4863]: USER_ACCT pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.495155 sshd[4863]: Accepted publickey for core from 147.75.109.163 port 59022 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:10.494000 audit[4863]: CRED_ACQ pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.501347 kernel: audit: type=1101 audit(1747305910.493:1406): pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.501446 kernel: audit: type=1103 audit(1747305910.494:1407): pid=4863 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.501866 sshd[4863]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:10.504369 kernel: audit: type=1006 audit(1747305910.495:1408): pid=4863 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 15 10:45:10.495000 audit[4863]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd22b83be0 a2=3 a3=0 items=0 ppid=1 pid=4863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:10.495000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:10.510587 kernel: audit: type=1300 audit(1747305910.495:1408): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd22b83be0 a2=3 a3=0 items=0 ppid=1 pid=4863 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:10.510639 kernel: audit: type=1327 audit(1747305910.495:1408): proctitle=737368643A20636F7265205B707269765D May 15 10:45:10.513593 systemd[1]: Started session-13.scope. May 15 10:45:10.514476 systemd-logind[1240]: New session 13 of user core. May 15 10:45:10.516000 audit[4863]: USER_START pid=4863 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.517000 audit[4865]: CRED_ACQ pid=4865 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.524990 kernel: audit: type=1105 audit(1747305910.516:1409): pid=4863 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.525047 kernel: audit: type=1103 audit(1747305910.517:1410): pid=4865 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.670963 sshd[4863]: pam_unix(sshd:session): session closed for user core May 15 10:45:10.673704 systemd[1]: Started sshd@12-139.178.70.100:22-147.75.109.163:59038.service. May 15 10:45:10.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.100:22-147.75.109.163:59038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:10.676000 audit[4863]: USER_END pid=4863 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.679016 systemd[1]: sshd@11-139.178.70.100:22-147.75.109.163:59022.service: Deactivated successfully. May 15 10:45:10.679497 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:45:10.681434 kernel: audit: type=1130 audit(1747305910.672:1411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.100:22-147.75.109.163:59038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:10.681495 kernel: audit: type=1106 audit(1747305910.676:1412): pid=4863 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.676000 audit[4863]: CRED_DISP pid=4863 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.100:22-147.75.109.163:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:10.681965 systemd-logind[1240]: Session 13 logged out. Waiting for processes to exit. May 15 10:45:10.682427 systemd-logind[1240]: Removed session 13. May 15 10:45:10.720000 audit[4874]: USER_ACCT pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.722571 sshd[4874]: Accepted publickey for core from 147.75.109.163 port 59038 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:10.722000 audit[4874]: CRED_ACQ pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.722000 audit[4874]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefe0cf420 a2=3 a3=0 items=0 ppid=1 pid=4874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:10.722000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:10.723860 sshd[4874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:10.727344 systemd[1]: Started session-14.scope. May 15 10:45:10.727704 systemd-logind[1240]: New session 14 of user core. May 15 10:45:10.729000 audit[4874]: USER_START pid=4874 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:10.730000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.063768 sshd[4874]: pam_unix(sshd:session): session closed for user core May 15 10:45:11.067746 systemd[1]: Started sshd@13-139.178.70.100:22-147.75.109.163:59044.service. May 15 10:45:11.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.100:22-147.75.109.163:59044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:11.067000 audit[4874]: USER_END pid=4874 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.067000 audit[4874]: CRED_DISP pid=4874 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.100:22-147.75.109.163:59038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:11.070296 systemd[1]: sshd@12-139.178.70.100:22-147.75.109.163:59038.service: Deactivated successfully. May 15 10:45:11.071088 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:45:11.072135 systemd-logind[1240]: Session 14 logged out. Waiting for processes to exit. May 15 10:45:11.072911 systemd-logind[1240]: Removed session 14. May 15 10:45:11.147000 audit[4884]: USER_ACCT pid=4884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.149155 sshd[4884]: Accepted publickey for core from 147.75.109.163 port 59044 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:11.148000 audit[4884]: CRED_ACQ pid=4884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.148000 audit[4884]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1c6e1130 a2=3 a3=0 items=0 ppid=1 pid=4884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:11.148000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:11.150696 sshd[4884]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:11.155450 systemd[1]: Started session-15.scope. May 15 10:45:11.155745 systemd-logind[1240]: New session 15 of user core. May 15 10:45:11.158000 audit[4884]: USER_START pid=4884 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.159000 audit[4887]: CRED_ACQ pid=4887 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.266408 sshd[4884]: pam_unix(sshd:session): session closed for user core May 15 10:45:11.266000 audit[4884]: USER_END pid=4884 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.266000 audit[4884]: CRED_DISP pid=4884 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:11.268883 systemd[1]: sshd@13-139.178.70.100:22-147.75.109.163:59044.service: Deactivated successfully. May 15 10:45:11.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.100:22-147.75.109.163:59044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:11.269353 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:45:11.270002 systemd-logind[1240]: Session 15 logged out. Waiting for processes to exit. May 15 10:45:11.270536 systemd-logind[1240]: Removed session 15. May 15 10:45:16.270460 systemd[1]: Started sshd@14-139.178.70.100:22-147.75.109.163:59052.service. May 15 10:45:16.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-147.75.109.163:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:16.272593 kernel: kauditd_printk_skb: 23 callbacks suppressed May 15 10:45:16.272718 kernel: audit: type=1130 audit(1747305916.269:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-147.75.109.163:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:16.350000 audit[4906]: USER_ACCT pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.355723 sshd[4906]: Accepted publickey for core from 147.75.109.163 port 59052 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:16.356245 kernel: audit: type=1101 audit(1747305916.350:1433): pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.356000 audit[4906]: CRED_ACQ pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.358040 sshd[4906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:16.364514 kernel: audit: type=1103 audit(1747305916.356:1434): pid=4906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.365459 kernel: audit: type=1006 audit(1747305916.356:1435): pid=4906 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 10:45:16.365500 kernel: audit: type=1300 audit(1747305916.356:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda3e10680 a2=3 a3=0 items=0 ppid=1 pid=4906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:16.356000 audit[4906]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda3e10680 a2=3 a3=0 items=0 ppid=1 pid=4906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:16.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:16.370349 kernel: audit: type=1327 audit(1747305916.356:1435): proctitle=737368643A20636F7265205B707269765D May 15 10:45:16.372548 systemd-logind[1240]: New session 16 of user core. May 15 10:45:16.373124 systemd[1]: Started session-16.scope. May 15 10:45:16.375000 audit[4906]: USER_START pid=4906 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.379000 audit[4908]: CRED_ACQ pid=4908 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.383199 kernel: audit: type=1105 audit(1747305916.375:1436): pid=4906 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.383247 kernel: audit: type=1103 audit(1747305916.379:1437): pid=4908 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.553089 sshd[4906]: pam_unix(sshd:session): session closed for user core May 15 10:45:16.553000 audit[4906]: USER_END pid=4906 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.558000 audit[4906]: CRED_DISP pid=4906 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.559688 systemd[1]: sshd@14-139.178.70.100:22-147.75.109.163:59052.service: Deactivated successfully. May 15 10:45:16.560154 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:45:16.561608 kernel: audit: type=1106 audit(1747305916.553:1438): pid=4906 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.561652 kernel: audit: type=1104 audit(1747305916.558:1439): pid=4906 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:16.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-147.75.109.163:59052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:16.562246 systemd-logind[1240]: Session 16 logged out. Waiting for processes to exit. May 15 10:45:16.562776 systemd-logind[1240]: Removed session 16. May 15 10:45:18.283000 audit[4218]: AVC avc: denied { watch } for pid=4218 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_44_00.3070075743/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c290,c743 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c290,c743 tclass=file permissive=0 May 15 10:45:18.283000 audit[4218]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001af64a0 a2=fc6 a3=0 items=0 ppid=3634 pid=4218 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c290,c743 key=(null) May 15 10:45:18.283000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:45:20.397588 update_engine[1241]: I0515 10:45:20.397289 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 10:45:20.397588 update_engine[1241]: I0515 10:45:20.397456 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 10:45:20.397588 update_engine[1241]: E0515 10:45:20.397523 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 10:45:20.397588 update_engine[1241]: I0515 10:45:20.397579 1241 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 15 10:45:21.554454 systemd[1]: Started sshd@15-139.178.70.100:22-147.75.109.163:60692.service. May 15 10:45:21.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-147.75.109.163:60692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:21.564208 kernel: kauditd_printk_skb: 4 callbacks suppressed May 15 10:45:21.564242 kernel: audit: type=1130 audit(1747305921.553:1442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-147.75.109.163:60692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:21.666000 audit[4919]: USER_ACCT pid=4919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.670724 sshd[4919]: Accepted publickey for core from 147.75.109.163 port 60692 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:21.671052 kernel: audit: type=1101 audit(1747305921.666:1443): pid=4919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.671000 audit[4919]: CRED_ACQ pid=4919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.672928 sshd[4919]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:21.677140 kernel: audit: type=1103 audit(1747305921.671:1444): pid=4919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.677302 kernel: audit: type=1006 audit(1747305921.671:1445): pid=4919 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 10:45:21.677328 kernel: audit: type=1300 audit(1747305921.671:1445): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1d8b48b0 a2=3 a3=0 items=0 ppid=1 pid=4919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:21.671000 audit[4919]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1d8b48b0 a2=3 a3=0 items=0 ppid=1 pid=4919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:21.671000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:21.681717 kernel: audit: type=1327 audit(1747305921.671:1445): proctitle=737368643A20636F7265205B707269765D May 15 10:45:21.683723 systemd-logind[1240]: New session 17 of user core. May 15 10:45:21.684527 systemd[1]: Started session-17.scope. May 15 10:45:21.686000 audit[4919]: USER_START pid=4919 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.686000 audit[4921]: CRED_ACQ pid=4921 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.694344 kernel: audit: type=1105 audit(1747305921.686:1446): pid=4919 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.694377 kernel: audit: type=1103 audit(1747305921.686:1447): pid=4921 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.832188 sshd[4919]: pam_unix(sshd:session): session closed for user core May 15 10:45:21.831000 audit[4919]: USER_END pid=4919 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.836000 audit[4919]: CRED_DISP pid=4919 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.839894 kernel: audit: type=1106 audit(1747305921.831:1448): pid=4919 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.845596 kernel: audit: type=1104 audit(1747305921.836:1449): pid=4919 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:21.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-147.75.109.163:60692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:21.840985 systemd-logind[1240]: Session 17 logged out. Waiting for processes to exit. May 15 10:45:21.841116 systemd[1]: sshd@15-139.178.70.100:22-147.75.109.163:60692.service: Deactivated successfully. May 15 10:45:21.841591 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:45:21.842128 systemd-logind[1240]: Removed session 17. May 15 10:45:26.375000 audit[4343]: AVC avc: denied { watch } for pid=4343 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_44_00.1760468798/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c737,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c737,c786 tclass=file permissive=0 May 15 10:45:26.375000 audit[4343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000adbc20 a2=fc6 a3=0 items=0 ppid=4163 pid=4343 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c737,c786 key=(null) May 15 10:45:26.375000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:45:26.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-147.75.109.163:60700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:26.838281 kernel: kauditd_printk_skb: 4 callbacks suppressed May 15 10:45:26.838329 kernel: audit: type=1130 audit(1747305926.836:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-147.75.109.163:60700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:26.836891 systemd[1]: Started sshd@16-139.178.70.100:22-147.75.109.163:60700.service. May 15 10:45:26.888000 audit[4930]: USER_ACCT pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:26.892830 sshd[4930]: Accepted publickey for core from 147.75.109.163 port 60700 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:26.893636 kernel: audit: type=1101 audit(1747305926.888:1453): pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:26.893684 kernel: audit: type=1103 audit(1747305926.892:1454): pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:26.892000 audit[4930]: CRED_ACQ pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:26.893307 sshd[4930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:26.898338 kernel: audit: type=1006 audit(1747305926.892:1455): pid=4930 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 10:45:26.892000 audit[4930]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa1e2c490 a2=3 a3=0 items=0 ppid=1 pid=4930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:26.900287 systemd[1]: Started session-18.scope. May 15 10:45:26.901049 systemd-logind[1240]: New session 18 of user core. May 15 10:45:26.901772 kernel: audit: type=1300 audit(1747305926.892:1455): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa1e2c490 a2=3 a3=0 items=0 ppid=1 pid=4930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:26.901802 kernel: audit: type=1327 audit(1747305926.892:1455): proctitle=737368643A20636F7265205B707269765D May 15 10:45:26.892000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:26.903000 audit[4930]: USER_START pid=4930 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:26.912018 kernel: audit: type=1105 audit(1747305926.903:1456): pid=4930 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:26.912079 kernel: audit: type=1103 audit(1747305926.903:1457): pid=4932 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:26.903000 audit[4932]: CRED_ACQ pid=4932 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:27.060182 sshd[4930]: pam_unix(sshd:session): session closed for user core May 15 10:45:27.059000 audit[4930]: USER_END pid=4930 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:27.061879 systemd[1]: sshd@16-139.178.70.100:22-147.75.109.163:60700.service: Deactivated successfully. May 15 10:45:27.074563 kernel: audit: type=1106 audit(1747305927.059:1458): pid=4930 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:27.086979 kernel: audit: type=1104 audit(1747305927.060:1459): pid=4930 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:27.060000 audit[4930]: CRED_DISP pid=4930 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:27.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-147.75.109.163:60700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:27.062329 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:45:27.064889 systemd-logind[1240]: Session 18 logged out. Waiting for processes to exit. May 15 10:45:27.068555 systemd-logind[1240]: Removed session 18. May 15 10:45:30.397435 update_engine[1241]: I0515 10:45:30.397379 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397607 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 10:45:30.397833 update_engine[1241]: E0515 10:45:30.397682 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397720 1241 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397725 1241 omaha_request_action.cc:621] Omaha request response: May 15 10:45:30.397833 update_engine[1241]: E0515 10:45:30.397782 1241 omaha_request_action.cc:640] Omaha request network transfer failed. May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397795 1241 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397797 1241 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397799 1241 update_attempter.cc:306] Processing Done. May 15 10:45:30.397833 update_engine[1241]: E0515 10:45:30.397809 1241 update_attempter.cc:619] Update failed. May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397814 1241 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397817 1241 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 15 10:45:30.397833 update_engine[1241]: I0515 10:45:30.397819 1241 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.397884 1241 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.397903 1241 omaha_request_action.cc:270] Posting an Omaha request to disabled May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.397905 1241 omaha_request_action.cc:271] Request: May 15 10:45:30.398250 update_engine[1241]: May 15 10:45:30.398250 update_engine[1241]: May 15 10:45:30.398250 update_engine[1241]: May 15 10:45:30.398250 update_engine[1241]: May 15 10:45:30.398250 update_engine[1241]: May 15 10:45:30.398250 update_engine[1241]: May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.397908 1241 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.397974 1241 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 10:45:30.398250 update_engine[1241]: E0515 10:45:30.398007 1241 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.398063 1241 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.398069 1241 omaha_request_action.cc:621] Omaha request response: May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.398072 1241 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.398072 1241 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.398074 1241 update_attempter.cc:306] Processing Done. May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.398077 1241 update_attempter.cc:310] Error event sent. May 15 10:45:30.398250 update_engine[1241]: I0515 10:45:30.398092 1241 update_check_scheduler.cc:74] Next update check in 43m45s May 15 10:45:30.398766 locksmithd[1296]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 15 10:45:30.398766 locksmithd[1296]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 15 10:45:32.064410 systemd[1]: Started sshd@17-139.178.70.100:22-147.75.109.163:55028.service. May 15 10:45:32.068213 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:45:32.068254 kernel: audit: type=1130 audit(1747305932.063:1461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-147.75.109.163:55028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:32.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-147.75.109.163:55028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:32.160000 audit[4967]: USER_ACCT pid=4967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.162562 sshd[4967]: Accepted publickey for core from 147.75.109.163 port 55028 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:32.164000 audit[4967]: CRED_ACQ pid=4967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.167123 sshd[4967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:32.169409 kernel: audit: type=1101 audit(1747305932.160:1462): pid=4967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.169469 kernel: audit: type=1103 audit(1747305932.164:1463): pid=4967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.169506 kernel: audit: type=1006 audit(1747305932.164:1464): pid=4967 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 15 10:45:32.164000 audit[4967]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1204f160 a2=3 a3=0 items=0 ppid=1 pid=4967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:32.174570 kernel: audit: type=1300 audit(1747305932.164:1464): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1204f160 a2=3 a3=0 items=0 ppid=1 pid=4967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:32.181773 kernel: audit: type=1327 audit(1747305932.164:1464): proctitle=737368643A20636F7265205B707269765D May 15 10:45:32.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:32.177909 systemd[1]: Started session-19.scope. May 15 10:45:32.178849 systemd-logind[1240]: New session 19 of user core. May 15 10:45:32.181000 audit[4967]: USER_START pid=4967 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.186410 kernel: audit: type=1105 audit(1747305932.181:1465): pid=4967 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.186450 kernel: audit: type=1103 audit(1747305932.185:1466): pid=4969 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.185000 audit[4969]: CRED_ACQ pid=4969 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.414271 systemd[1]: Started sshd@18-139.178.70.100:22-147.75.109.163:55042.service. May 15 10:45:32.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-147.75.109.163:55042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:32.418918 sshd[4967]: pam_unix(sshd:session): session closed for user core May 15 10:45:32.419048 kernel: audit: type=1130 audit(1747305932.413:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-147.75.109.163:55042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:32.420000 audit[4967]: USER_END pid=4967 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.420000 audit[4967]: CRED_DISP pid=4967 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.426045 kernel: audit: type=1106 audit(1747305932.420:1468): pid=4967 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.426929 systemd[1]: sshd@17-139.178.70.100:22-147.75.109.163:55028.service: Deactivated successfully. May 15 10:45:32.427452 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:45:32.427837 systemd-logind[1240]: Session 19 logged out. Waiting for processes to exit. May 15 10:45:32.428480 systemd-logind[1240]: Removed session 19. May 15 10:45:32.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-147.75.109.163:55028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:32.463000 audit[4977]: USER_ACCT pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.465000 audit[4977]: CRED_ACQ pid=4977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.465000 audit[4977]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaa03c9f0 a2=3 a3=0 items=0 ppid=1 pid=4977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:32.465000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:32.470447 systemd[1]: Started session-20.scope. May 15 10:45:32.466475 sshd[4977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:32.474000 audit[4977]: USER_START pid=4977 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.475000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:32.495552 sshd[4977]: Accepted publickey for core from 147.75.109.163 port 55042 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:32.471380 systemd-logind[1240]: New session 20 of user core. May 15 10:45:33.167928 systemd[1]: Started sshd@19-139.178.70.100:22-147.75.109.163:55054.service. May 15 10:45:33.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-147.75.109.163:55054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:33.192991 sshd[4977]: pam_unix(sshd:session): session closed for user core May 15 10:45:33.204000 audit[4977]: USER_END pid=4977 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:33.205000 audit[4977]: CRED_DISP pid=4977 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:33.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-147.75.109.163:55042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:33.215527 systemd[1]: sshd@18-139.178.70.100:22-147.75.109.163:55042.service: Deactivated successfully. May 15 10:45:33.216111 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:45:33.217015 systemd-logind[1240]: Session 20 logged out. Waiting for processes to exit. May 15 10:45:33.217542 systemd-logind[1240]: Removed session 20. May 15 10:45:33.275000 audit[4987]: USER_ACCT pid=4987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:33.277012 sshd[4987]: Accepted publickey for core from 147.75.109.163 port 55054 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:33.276000 audit[4987]: CRED_ACQ pid=4987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:33.276000 audit[4987]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe78241850 a2=3 a3=0 items=0 ppid=1 pid=4987 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:33.276000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:33.281726 sshd[4987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:33.293954 systemd[1]: Started session-21.scope. May 15 10:45:33.296000 audit[4987]: USER_START pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:33.297000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:33.294065 systemd-logind[1240]: New session 21 of user core. May 15 10:45:34.449000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:34.449000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000aa5200 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:34.449000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:34.449000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:34.449000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a98400 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:34.449000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:34.489364 systemd[1]: Started sshd@20-139.178.70.100:22-147.75.109.163:55070.service. May 15 10:45:34.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-147.75.109.163:55070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:34.506579 sshd[4987]: pam_unix(sshd:session): session closed for user core May 15 10:45:34.517000 audit[4987]: USER_END pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:34.517000 audit[4987]: CRED_DISP pid=4987 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:34.555161 systemd[1]: sshd@19-139.178.70.100:22-147.75.109.163:55054.service: Deactivated successfully. May 15 10:45:34.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-147.75.109.163:55054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:34.555841 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:45:34.555868 systemd-logind[1240]: Session 21 logged out. Waiting for processes to exit. May 15 10:45:34.556461 systemd-logind[1240]: Removed session 21. May 15 10:45:34.604000 audit[5000]: USER_ACCT pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:34.606177 sshd[5000]: Accepted publickey for core from 147.75.109.163 port 55070 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:34.605000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:34.605000 audit[5000]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc3ec1cd0 a2=3 a3=0 items=0 ppid=1 pid=5000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.605000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:34.608652 sshd[5000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:34.611915 systemd-logind[1240]: New session 22 of user core. May 15 10:45:34.612450 systemd[1]: Started session-22.scope. May 15 10:45:34.615000 audit[5000]: USER_START pid=5000 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:34.616000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:34.620000 audit[5004]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:34.620000 audit[5004]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcfe439e20 a2=0 a3=7ffcfe439e0c items=0 ppid=2232 pid=5004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:34.625000 audit[5004]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:34.625000 audit[5004]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcfe439e20 a2=0 a3=0 items=0 ppid=2232 pid=5004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:34.636000 audit[5007]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:34.636000 audit[5007]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe898d0490 a2=0 a3=7ffe898d047c items=0 ppid=2232 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:34.640000 audit[5007]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:34.640000 audit[5007]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe898d0490 a2=0 a3=0 items=0 ppid=2232 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:35.080000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:35.080000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c010a09d60 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:45:35.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:45:35.081000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7320 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:35.081000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00e3a40c0 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:45:35.081000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:45:35.082000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:35.082000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c01096ab40 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:45:35.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:45:35.093000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:35.093000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7318 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:35.093000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00e3a4120 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:45:35.093000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:45:35.093000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00e5a99e0 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:45:35.093000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:45:35.097000 audit[1969]: AVC avc: denied { watch } for pid=1969 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:35.097000 audit[1969]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00e3a4210 a2=fc6 a3=0 items=0 ppid=1799 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c399,c654 key=(null) May 15 10:45:35.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 10:45:35.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-147.75.109.163:55078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:35.478216 systemd[1]: Started sshd@21-139.178.70.100:22-147.75.109.163:55078.service. May 15 10:45:35.478000 audit[5000]: USER_END pid=5000 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:35.479000 audit[5000]: CRED_DISP pid=5000 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:35.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-147.75.109.163:55070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:35.478610 sshd[5000]: pam_unix(sshd:session): session closed for user core May 15 10:45:35.480997 systemd[1]: sshd@20-139.178.70.100:22-147.75.109.163:55070.service: Deactivated successfully. May 15 10:45:35.481498 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:45:35.482804 systemd-logind[1240]: Session 22 logged out. Waiting for processes to exit. May 15 10:45:35.484655 systemd-logind[1240]: Removed session 22. May 15 10:45:35.615000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:35.617061 sshd[5014]: Accepted publickey for core from 147.75.109.163 port 55078 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:35.616000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:35.616000 audit[5014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbabeb830 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:35.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:35.618371 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:35.622070 systemd-logind[1240]: New session 23 of user core. May 15 10:45:35.622681 systemd[1]: Started session-23.scope. May 15 10:45:35.624000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:35.625000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:35.812183 sshd[5014]: pam_unix(sshd:session): session closed for user core May 15 10:45:35.812000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:35.812000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:35.814541 systemd-logind[1240]: Session 23 logged out. Waiting for processes to exit. May 15 10:45:35.814641 systemd[1]: sshd@21-139.178.70.100:22-147.75.109.163:55078.service: Deactivated successfully. May 15 10:45:35.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-147.75.109.163:55078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:35.815101 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:45:35.815564 systemd-logind[1240]: Removed session 23. May 15 10:45:38.167323 systemd[1]: run-containerd-runc-k8s.io-75720a6c78d07c71475b8d793394883ad306fb78c5da3209f76ef3ed4794be27-runc.AON5SJ.mount: Deactivated successfully. May 15 10:45:38.920020 kernel: kauditd_printk_skb: 81 callbacks suppressed May 15 10:45:38.928104 kernel: audit: type=1400 audit(1747305938.915:1518): avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:38.935216 kernel: audit: type=1300 audit(1747305938.915:1518): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8d5c0 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:38.935241 kernel: audit: type=1327 audit(1747305938.915:1518): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:38.935266 kernel: audit: type=1400 audit(1747305938.924:1519): avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:38.935287 kernel: audit: type=1300 audit(1747305938.924:1519): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8d5e0 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:38.915000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:38.915000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8d5c0 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:38.915000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:38.924000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:38.924000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8d5e0 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:38.941845 kernel: audit: type=1327 audit(1747305938.924:1519): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:38.952044 kernel: audit: type=1400 audit(1747305938.924:1520): avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:38.952077 kernel: audit: type=1300 audit(1747305938.924:1520): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8d600 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:38.957593 kernel: audit: type=1327 audit(1747305938.924:1520): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:38.957618 kernel: audit: type=1400 audit(1747305938.953:1521): avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:38.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:38.924000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:38.924000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c8d600 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:38.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:38.953000 audit[1977]: AVC avc: denied { watch } for pid=1977 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:45:38.953000 audit[1977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00206c920 a2=fc6 a3=0 items=0 ppid=1869 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c411 key=(null) May 15 10:45:38.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:45:39.506000 audit[5052]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=5052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:39.506000 audit[5052]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffcf2f5e90 a2=0 a3=7fffcf2f5e7c items=0 ppid=2232 pid=5052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:39.511000 audit[5052]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=5052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:39.511000 audit[5052]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffcf2f5e90 a2=0 a3=7fffcf2f5e7c items=0 ppid=2232 pid=5052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:40.815793 systemd[1]: Started sshd@22-139.178.70.100:22-147.75.109.163:46938.service. May 15 10:45:40.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-147.75.109.163:46938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:41.010825 sshd[5054]: Accepted publickey for core from 147.75.109.163 port 46938 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:41.009000 audit[5054]: USER_ACCT pid=5054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:41.010000 audit[5054]: CRED_ACQ pid=5054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:41.010000 audit[5054]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff676ef430 a2=3 a3=0 items=0 ppid=1 pid=5054 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:41.010000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:41.014059 sshd[5054]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:41.022744 systemd-logind[1240]: New session 24 of user core. May 15 10:45:41.023306 systemd[1]: Started session-24.scope. May 15 10:45:41.026000 audit[5054]: USER_START pid=5054 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:41.027000 audit[5056]: CRED_ACQ pid=5056 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:41.244607 sshd[5054]: pam_unix(sshd:session): session closed for user core May 15 10:45:41.245000 audit[5054]: USER_END pid=5054 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:41.245000 audit[5054]: CRED_DISP pid=5054 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:41.247859 systemd[1]: sshd@22-139.178.70.100:22-147.75.109.163:46938.service: Deactivated successfully. May 15 10:45:41.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-147.75.109.163:46938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:41.248375 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:45:41.249087 systemd-logind[1240]: Session 24 logged out. Waiting for processes to exit. May 15 10:45:41.251169 systemd-logind[1240]: Removed session 24. May 15 10:45:46.248939 systemd[1]: Started sshd@23-139.178.70.100:22-147.75.109.163:46952.service. May 15 10:45:46.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-147.75.109.163:46952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:46.250406 kernel: kauditd_printk_skb: 19 callbacks suppressed May 15 10:45:46.251004 kernel: audit: type=1130 audit(1747305946.248:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-147.75.109.163:46952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:46.304000 audit[5085]: USER_ACCT pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.306437 sshd[5085]: Accepted publickey for core from 147.75.109.163 port 46952 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:46.309046 kernel: audit: type=1101 audit(1747305946.304:1534): pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.308000 audit[5085]: CRED_ACQ pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.309766 sshd[5085]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:46.314345 kernel: audit: type=1103 audit(1747305946.308:1535): pid=5085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.314383 kernel: audit: type=1006 audit(1747305946.308:1536): pid=5085 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 15 10:45:46.308000 audit[5085]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff68210c40 a2=3 a3=0 items=0 ppid=1 pid=5085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:46.318419 kernel: audit: type=1300 audit(1747305946.308:1536): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff68210c40 a2=3 a3=0 items=0 ppid=1 pid=5085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:46.308000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:46.319585 kernel: audit: type=1327 audit(1747305946.308:1536): proctitle=737368643A20636F7265205B707269765D May 15 10:45:46.322422 systemd[1]: Started session-25.scope. May 15 10:45:46.322891 systemd-logind[1240]: New session 25 of user core. May 15 10:45:46.325000 audit[5085]: USER_START pid=5085 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.331375 kernel: audit: type=1105 audit(1747305946.325:1537): pid=5085 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.325000 audit[5087]: CRED_ACQ pid=5087 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.335100 kernel: audit: type=1103 audit(1747305946.325:1538): pid=5087 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.489075 sshd[5085]: pam_unix(sshd:session): session closed for user core May 15 10:45:46.488000 audit[5085]: USER_END pid=5085 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.491007 systemd[1]: sshd@23-139.178.70.100:22-147.75.109.163:46952.service: Deactivated successfully. May 15 10:45:46.491470 systemd[1]: session-25.scope: Deactivated successfully. May 15 10:45:46.489000 audit[5085]: CRED_DISP pid=5085 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.496888 kernel: audit: type=1106 audit(1747305946.488:1539): pid=5085 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.497677 kernel: audit: type=1104 audit(1747305946.489:1540): pid=5085 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:46.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-147.75.109.163:46952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:46.496922 systemd-logind[1240]: Session 25 logged out. Waiting for processes to exit. May 15 10:45:46.497613 systemd-logind[1240]: Removed session 25. May 15 10:45:51.491677 systemd[1]: Started sshd@24-139.178.70.100:22-147.75.109.163:46176.service. May 15 10:45:51.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.100:22-147.75.109.163:46176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:51.500523 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:45:51.500570 kernel: audit: type=1130 audit(1747305951.490:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.100:22-147.75.109.163:46176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:51.567000 audit[5097]: USER_ACCT pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.572220 sshd[5097]: Accepted publickey for core from 147.75.109.163 port 46176 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:45:51.573082 kernel: audit: type=1101 audit(1747305951.567:1543): pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.574173 kernel: audit: type=1103 audit(1747305951.572:1544): pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.572000 audit[5097]: CRED_ACQ pid=5097 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.574416 sshd[5097]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:45:51.578441 kernel: audit: type=1006 audit(1747305951.572:1545): pid=5097 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 15 10:45:51.572000 audit[5097]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff68649270 a2=3 a3=0 items=0 ppid=1 pid=5097 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:51.581767 kernel: audit: type=1300 audit(1747305951.572:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff68649270 a2=3 a3=0 items=0 ppid=1 pid=5097 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:51.572000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:45:51.584041 kernel: audit: type=1327 audit(1747305951.572:1545): proctitle=737368643A20636F7265205B707269765D May 15 10:45:51.585205 systemd-logind[1240]: New session 26 of user core. May 15 10:45:51.585669 systemd[1]: Started session-26.scope. May 15 10:45:51.587000 audit[5097]: USER_START pid=5097 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.587000 audit[5099]: CRED_ACQ pid=5099 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.595394 kernel: audit: type=1105 audit(1747305951.587:1546): pid=5097 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.595420 kernel: audit: type=1103 audit(1747305951.587:1547): pid=5099 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.768197 sshd[5097]: pam_unix(sshd:session): session closed for user core May 15 10:45:51.769000 audit[5097]: USER_END pid=5097 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.773000 audit[5097]: CRED_DISP pid=5097 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.778358 kernel: audit: type=1106 audit(1747305951.769:1548): pid=5097 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.778411 kernel: audit: type=1104 audit(1747305951.773:1549): pid=5097 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:45:51.831420 systemd-logind[1240]: Session 26 logged out. Waiting for processes to exit. May 15 10:45:51.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.100:22-147.75.109.163:46176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:45:51.832065 systemd[1]: sshd@24-139.178.70.100:22-147.75.109.163:46176.service: Deactivated successfully. May 15 10:45:51.832833 systemd[1]: session-26.scope: Deactivated successfully. May 15 10:45:51.833473 systemd-logind[1240]: Removed session 26.