May 10 00:58:46.635643 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:58:46.635658 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:58:46.635664 kernel: Disabled fast string operations May 10 00:58:46.635667 kernel: BIOS-provided physical RAM map: May 10 00:58:46.635671 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable May 10 00:58:46.635675 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved May 10 00:58:46.635680 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved May 10 00:58:46.635684 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable May 10 00:58:46.635688 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data May 10 00:58:46.635692 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS May 10 00:58:46.635696 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable May 10 00:58:46.635700 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved May 10 00:58:46.635703 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved May 10 00:58:46.635707 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 10 00:58:46.635713 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved May 10 00:58:46.635717 kernel: NX (Execute Disable) protection: active May 10 00:58:46.635721 kernel: SMBIOS 2.7 present. May 10 00:58:46.635726 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 May 10 00:58:46.635730 kernel: vmware: hypercall mode: 0x00 May 10 00:58:46.635734 kernel: Hypervisor detected: VMware May 10 00:58:46.635739 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz May 10 00:58:46.635743 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz May 10 00:58:46.635747 kernel: vmware: using clock offset of 2601850136 ns May 10 00:58:46.635751 kernel: tsc: Detected 3408.000 MHz processor May 10 00:58:46.635756 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:58:46.635761 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:58:46.635765 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 May 10 00:58:46.635769 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:58:46.635774 kernel: total RAM covered: 3072M May 10 00:58:46.635779 kernel: Found optimal setting for mtrr clean up May 10 00:58:46.635783 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G May 10 00:58:46.635788 kernel: Using GB pages for direct mapping May 10 00:58:46.635792 kernel: ACPI: Early table checksum verification disabled May 10 00:58:46.635796 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) May 10 00:58:46.635800 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) May 10 00:58:46.635805 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) May 10 00:58:46.635809 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) May 10 00:58:46.635813 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 10 00:58:46.635817 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 10 00:58:46.635823 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) May 10 00:58:46.635829 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) May 10 00:58:46.635834 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) May 10 00:58:46.635838 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) May 10 00:58:46.635843 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) May 10 00:58:46.635848 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) May 10 00:58:46.635853 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] May 10 00:58:46.635858 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] May 10 00:58:46.635862 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 10 00:58:46.635867 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 10 00:58:46.635871 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] May 10 00:58:46.635876 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] May 10 00:58:46.635881 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] May 10 00:58:46.635885 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] May 10 00:58:46.635891 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] May 10 00:58:46.635895 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] May 10 00:58:46.635900 kernel: system APIC only can use physical flat May 10 00:58:46.635904 kernel: Setting APIC routing to physical flat. May 10 00:58:46.635909 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:58:46.635914 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 10 00:58:46.635918 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 10 00:58:46.635923 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 10 00:58:46.635927 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 10 00:58:46.638110 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 10 00:58:46.638118 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 10 00:58:46.638123 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 10 00:58:46.638128 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 May 10 00:58:46.638132 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 May 10 00:58:46.638137 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 May 10 00:58:46.638142 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 May 10 00:58:46.638146 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 May 10 00:58:46.638151 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 May 10 00:58:46.638155 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 May 10 00:58:46.638162 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 May 10 00:58:46.638167 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 May 10 00:58:46.638171 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 May 10 00:58:46.638176 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 May 10 00:58:46.638180 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 May 10 00:58:46.638185 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 May 10 00:58:46.638189 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 May 10 00:58:46.638194 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 May 10 00:58:46.638198 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 May 10 00:58:46.638203 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 May 10 00:58:46.638208 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 May 10 00:58:46.638213 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 May 10 00:58:46.638218 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 May 10 00:58:46.638222 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 May 10 00:58:46.638227 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 May 10 00:58:46.638231 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 May 10 00:58:46.638236 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 May 10 00:58:46.638240 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 May 10 00:58:46.638245 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 May 10 00:58:46.638250 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 May 10 00:58:46.638255 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 May 10 00:58:46.638260 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 May 10 00:58:46.638264 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 May 10 00:58:46.638269 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 May 10 00:58:46.638273 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 May 10 00:58:46.638278 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 May 10 00:58:46.638283 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 May 10 00:58:46.638287 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 May 10 00:58:46.638292 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 May 10 00:58:46.638296 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 May 10 00:58:46.638302 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 May 10 00:58:46.638306 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 May 10 00:58:46.638311 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 May 10 00:58:46.638315 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 May 10 00:58:46.638320 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 May 10 00:58:46.638324 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 May 10 00:58:46.638329 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 May 10 00:58:46.638333 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 May 10 00:58:46.638338 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 May 10 00:58:46.638343 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 May 10 00:58:46.638348 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 May 10 00:58:46.638352 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 May 10 00:58:46.638357 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 May 10 00:58:46.638361 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 May 10 00:58:46.638366 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 May 10 00:58:46.638372 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 May 10 00:58:46.638379 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 May 10 00:58:46.638385 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 May 10 00:58:46.638389 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 May 10 00:58:46.638394 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 May 10 00:58:46.638399 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 May 10 00:58:46.638405 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 May 10 00:58:46.638410 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 May 10 00:58:46.638415 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 May 10 00:58:46.638420 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 May 10 00:58:46.638425 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 May 10 00:58:46.638429 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 May 10 00:58:46.638435 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 May 10 00:58:46.638440 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 May 10 00:58:46.638445 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 May 10 00:58:46.638450 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 May 10 00:58:46.638455 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 May 10 00:58:46.638459 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 May 10 00:58:46.638464 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 May 10 00:58:46.638469 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 May 10 00:58:46.638474 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 May 10 00:58:46.638479 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 May 10 00:58:46.638485 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 May 10 00:58:46.638490 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 May 10 00:58:46.638495 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 May 10 00:58:46.638500 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 May 10 00:58:46.638505 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 May 10 00:58:46.638509 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 May 10 00:58:46.638514 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 May 10 00:58:46.638519 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 May 10 00:58:46.638524 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 May 10 00:58:46.638529 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 May 10 00:58:46.638534 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 May 10 00:58:46.638539 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 May 10 00:58:46.638544 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 May 10 00:58:46.638549 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 May 10 00:58:46.638554 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 May 10 00:58:46.638559 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 May 10 00:58:46.638564 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 May 10 00:58:46.638569 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 May 10 00:58:46.638574 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 May 10 00:58:46.638578 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 May 10 00:58:46.638584 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 May 10 00:58:46.638589 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 May 10 00:58:46.638594 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 May 10 00:58:46.638599 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 May 10 00:58:46.638604 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 May 10 00:58:46.638608 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 May 10 00:58:46.638613 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 May 10 00:58:46.638618 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 May 10 00:58:46.638623 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 May 10 00:58:46.638628 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 May 10 00:58:46.638634 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 May 10 00:58:46.638638 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 May 10 00:58:46.638643 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 May 10 00:58:46.638648 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 May 10 00:58:46.638653 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 May 10 00:58:46.638658 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 May 10 00:58:46.638662 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 May 10 00:58:46.638667 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 May 10 00:58:46.638672 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 May 10 00:58:46.638678 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 May 10 00:58:46.638683 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 May 10 00:58:46.638688 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 May 10 00:58:46.638693 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 May 10 00:58:46.638697 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 May 10 00:58:46.638702 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 May 10 00:58:46.638707 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 May 10 00:58:46.638712 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 10 00:58:46.638717 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 10 00:58:46.638722 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug May 10 00:58:46.638728 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] May 10 00:58:46.638733 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] May 10 00:58:46.638739 kernel: Zone ranges: May 10 00:58:46.638744 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:58:46.638749 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] May 10 00:58:46.638754 kernel: Normal empty May 10 00:58:46.638759 kernel: Movable zone start for each node May 10 00:58:46.638764 kernel: Early memory node ranges May 10 00:58:46.638769 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] May 10 00:58:46.638774 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] May 10 00:58:46.638779 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] May 10 00:58:46.638784 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] May 10 00:58:46.638789 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:58:46.638794 kernel: On node 0, zone DMA: 98 pages in unavailable ranges May 10 00:58:46.638799 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges May 10 00:58:46.638804 kernel: ACPI: PM-Timer IO Port: 0x1008 May 10 00:58:46.638809 kernel: system APIC only can use physical flat May 10 00:58:46.638814 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) May 10 00:58:46.638819 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 10 00:58:46.638825 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 10 00:58:46.638830 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 10 00:58:46.638835 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 10 00:58:46.638840 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 10 00:58:46.638845 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 10 00:58:46.638850 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 10 00:58:46.638855 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 10 00:58:46.638860 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 10 00:58:46.638865 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 10 00:58:46.638871 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 10 00:58:46.638876 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 10 00:58:46.638881 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 10 00:58:46.638886 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 10 00:58:46.638890 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 10 00:58:46.638895 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 10 00:58:46.638900 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) May 10 00:58:46.638905 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) May 10 00:58:46.638910 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) May 10 00:58:46.638915 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) May 10 00:58:46.638921 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) May 10 00:58:46.638926 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) May 10 00:58:46.638931 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) May 10 00:58:46.638936 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) May 10 00:58:46.638941 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) May 10 00:58:46.638946 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) May 10 00:58:46.638951 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) May 10 00:58:46.638956 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) May 10 00:58:46.638960 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) May 10 00:58:46.638966 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) May 10 00:58:46.638971 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) May 10 00:58:46.638976 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) May 10 00:58:46.638981 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) May 10 00:58:46.638986 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) May 10 00:58:46.638991 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) May 10 00:58:46.638996 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) May 10 00:58:46.639000 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) May 10 00:58:46.639005 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) May 10 00:58:46.639010 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) May 10 00:58:46.639016 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) May 10 00:58:46.639021 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) May 10 00:58:46.639025 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) May 10 00:58:46.639030 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) May 10 00:58:46.639035 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) May 10 00:58:46.639040 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) May 10 00:58:46.639045 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) May 10 00:58:46.639050 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) May 10 00:58:46.639055 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) May 10 00:58:46.639061 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) May 10 00:58:46.639065 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) May 10 00:58:46.639070 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) May 10 00:58:46.639075 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) May 10 00:58:46.639087 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) May 10 00:58:46.639093 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) May 10 00:58:46.639098 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) May 10 00:58:46.639103 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) May 10 00:58:46.639108 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) May 10 00:58:46.639114 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) May 10 00:58:46.639119 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) May 10 00:58:46.639124 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) May 10 00:58:46.639129 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) May 10 00:58:46.639134 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) May 10 00:58:46.639139 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) May 10 00:58:46.639144 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) May 10 00:58:46.639149 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) May 10 00:58:46.639154 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) May 10 00:58:46.639158 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) May 10 00:58:46.639164 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) May 10 00:58:46.639169 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) May 10 00:58:46.639174 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) May 10 00:58:46.639179 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) May 10 00:58:46.639184 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) May 10 00:58:46.639189 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) May 10 00:58:46.639194 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) May 10 00:58:46.639199 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) May 10 00:58:46.639204 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) May 10 00:58:46.639209 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) May 10 00:58:46.639214 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) May 10 00:58:46.639219 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) May 10 00:58:46.639224 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) May 10 00:58:46.639229 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) May 10 00:58:46.639234 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) May 10 00:58:46.639239 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) May 10 00:58:46.639243 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) May 10 00:58:46.639248 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) May 10 00:58:46.639253 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) May 10 00:58:46.639259 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) May 10 00:58:46.639264 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) May 10 00:58:46.639269 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) May 10 00:58:46.639274 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) May 10 00:58:46.639279 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) May 10 00:58:46.639283 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) May 10 00:58:46.639288 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) May 10 00:58:46.639293 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) May 10 00:58:46.639298 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) May 10 00:58:46.639304 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) May 10 00:58:46.639309 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) May 10 00:58:46.639314 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) May 10 00:58:46.639319 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) May 10 00:58:46.639323 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) May 10 00:58:46.639328 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) May 10 00:58:46.639333 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) May 10 00:58:46.639338 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) May 10 00:58:46.639343 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) May 10 00:58:46.639348 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) May 10 00:58:46.639354 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) May 10 00:58:46.639359 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) May 10 00:58:46.639364 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) May 10 00:58:46.639369 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) May 10 00:58:46.639373 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) May 10 00:58:46.639378 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) May 10 00:58:46.639383 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) May 10 00:58:46.639388 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) May 10 00:58:46.639393 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) May 10 00:58:46.639399 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) May 10 00:58:46.639404 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) May 10 00:58:46.639409 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) May 10 00:58:46.639413 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) May 10 00:58:46.639418 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) May 10 00:58:46.639423 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) May 10 00:58:46.639428 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) May 10 00:58:46.639433 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) May 10 00:58:46.639438 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) May 10 00:58:46.639444 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) May 10 00:58:46.639448 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) May 10 00:58:46.639453 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) May 10 00:58:46.639458 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) May 10 00:58:46.639463 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 May 10 00:58:46.639468 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) May 10 00:58:46.639473 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:58:46.639478 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 May 10 00:58:46.639483 kernel: TSC deadline timer available May 10 00:58:46.639488 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs May 10 00:58:46.639494 kernel: [mem 0x80000000-0xefffffff] available for PCI devices May 10 00:58:46.639499 kernel: Booting paravirtualized kernel on VMware hypervisor May 10 00:58:46.639504 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:58:46.639509 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 May 10 00:58:46.639514 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 10 00:58:46.639520 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 10 00:58:46.639524 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 May 10 00:58:46.639529 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 May 10 00:58:46.639534 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 May 10 00:58:46.639540 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 May 10 00:58:46.639545 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 May 10 00:58:46.639549 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 May 10 00:58:46.639554 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 May 10 00:58:46.639565 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 May 10 00:58:46.639571 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 May 10 00:58:46.639577 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 May 10 00:58:46.639582 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 May 10 00:58:46.639588 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 May 10 00:58:46.639593 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 May 10 00:58:46.639598 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 May 10 00:58:46.639603 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 May 10 00:58:46.639608 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 May 10 00:58:46.639614 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 May 10 00:58:46.639619 kernel: Policy zone: DMA32 May 10 00:58:46.639625 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:58:46.639632 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:58:46.639637 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes May 10 00:58:46.639642 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes May 10 00:58:46.639648 kernel: printk: log_buf_len min size: 262144 bytes May 10 00:58:46.639653 kernel: printk: log_buf_len: 1048576 bytes May 10 00:58:46.639658 kernel: printk: early log buf free: 239728(91%) May 10 00:58:46.639663 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:58:46.639668 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:58:46.639674 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:58:46.639680 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 155976K reserved, 0K cma-reserved) May 10 00:58:46.639686 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 May 10 00:58:46.639691 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:58:46.639696 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:58:46.639703 kernel: rcu: Hierarchical RCU implementation. May 10 00:58:46.639708 kernel: rcu: RCU event tracing is enabled. May 10 00:58:46.639715 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. May 10 00:58:46.639720 kernel: Rude variant of Tasks RCU enabled. May 10 00:58:46.639725 kernel: Tracing variant of Tasks RCU enabled. May 10 00:58:46.639731 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:58:46.639736 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 May 10 00:58:46.639741 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 May 10 00:58:46.639747 kernel: random: crng init done May 10 00:58:46.639752 kernel: Console: colour VGA+ 80x25 May 10 00:58:46.639757 kernel: printk: console [tty0] enabled May 10 00:58:46.639764 kernel: printk: console [ttyS0] enabled May 10 00:58:46.639769 kernel: ACPI: Core revision 20210730 May 10 00:58:46.639775 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns May 10 00:58:46.639780 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:58:46.639786 kernel: x2apic enabled May 10 00:58:46.639791 kernel: Switched APIC routing to physical x2apic. May 10 00:58:46.639796 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:58:46.639802 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 10 00:58:46.639807 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) May 10 00:58:46.639813 kernel: Disabled fast string operations May 10 00:58:46.639818 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 10 00:58:46.639824 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 10 00:58:46.639829 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:58:46.639835 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 10 00:58:46.639840 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 10 00:58:46.639846 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 10 00:58:46.639851 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 10 00:58:46.639856 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 10 00:58:46.639863 kernel: RETBleed: Mitigation: Enhanced IBRS May 10 00:58:46.639868 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:58:46.639873 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:58:46.639879 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:58:46.639884 kernel: SRBDS: Unknown: Dependent on hypervisor status May 10 00:58:46.639889 kernel: GDS: Unknown: Dependent on hypervisor status May 10 00:58:46.639895 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:58:46.639900 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:58:46.639907 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:58:46.639912 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:58:46.639917 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. May 10 00:58:46.639923 kernel: Freeing SMP alternatives memory: 32K May 10 00:58:46.639928 kernel: pid_max: default: 131072 minimum: 1024 May 10 00:58:46.639933 kernel: LSM: Security Framework initializing May 10 00:58:46.639938 kernel: SELinux: Initializing. May 10 00:58:46.639944 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:58:46.639949 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:58:46.639956 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 10 00:58:46.639961 kernel: Performance Events: Skylake events, core PMU driver. May 10 00:58:46.639966 kernel: core: CPUID marked event: 'cpu cycles' unavailable May 10 00:58:46.639971 kernel: core: CPUID marked event: 'instructions' unavailable May 10 00:58:46.639977 kernel: core: CPUID marked event: 'bus cycles' unavailable May 10 00:58:46.639982 kernel: core: CPUID marked event: 'cache references' unavailable May 10 00:58:46.639987 kernel: core: CPUID marked event: 'cache misses' unavailable May 10 00:58:46.639992 kernel: core: CPUID marked event: 'branch instructions' unavailable May 10 00:58:46.639997 kernel: core: CPUID marked event: 'branch misses' unavailable May 10 00:58:46.640003 kernel: ... version: 1 May 10 00:58:46.640008 kernel: ... bit width: 48 May 10 00:58:46.640014 kernel: ... generic registers: 4 May 10 00:58:46.640019 kernel: ... value mask: 0000ffffffffffff May 10 00:58:46.640025 kernel: ... max period: 000000007fffffff May 10 00:58:46.640030 kernel: ... fixed-purpose events: 0 May 10 00:58:46.640035 kernel: ... event mask: 000000000000000f May 10 00:58:46.640040 kernel: signal: max sigframe size: 1776 May 10 00:58:46.640046 kernel: rcu: Hierarchical SRCU implementation. May 10 00:58:46.640052 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:58:46.640057 kernel: smp: Bringing up secondary CPUs ... May 10 00:58:46.640062 kernel: x86: Booting SMP configuration: May 10 00:58:46.640068 kernel: .... node #0, CPUs: #1 May 10 00:58:46.640073 kernel: Disabled fast string operations May 10 00:58:46.640084 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 May 10 00:58:46.640090 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 10 00:58:46.640095 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:58:46.642649 kernel: smpboot: Max logical packages: 128 May 10 00:58:46.642658 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) May 10 00:58:46.642666 kernel: devtmpfs: initialized May 10 00:58:46.642672 kernel: x86/mm: Memory block size: 128MB May 10 00:58:46.642678 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) May 10 00:58:46.642683 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:58:46.642689 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) May 10 00:58:46.642694 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:58:46.642699 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:58:46.642704 kernel: audit: initializing netlink subsys (disabled) May 10 00:58:46.642710 kernel: audit: type=2000 audit(1746838725.056:1): state=initialized audit_enabled=0 res=1 May 10 00:58:46.642716 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:58:46.642721 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:58:46.642726 kernel: cpuidle: using governor menu May 10 00:58:46.642732 kernel: Simple Boot Flag at 0x36 set to 0x80 May 10 00:58:46.642737 kernel: ACPI: bus type PCI registered May 10 00:58:46.642742 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:58:46.642748 kernel: dca service started, version 1.12.1 May 10 00:58:46.642753 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) May 10 00:58:46.642758 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 May 10 00:58:46.642764 kernel: PCI: Using configuration type 1 for base access May 10 00:58:46.642770 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:58:46.642775 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:58:46.642780 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:58:46.642785 kernel: ACPI: Added _OSI(Module Device) May 10 00:58:46.642791 kernel: ACPI: Added _OSI(Processor Device) May 10 00:58:46.642796 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:58:46.642801 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:58:46.642806 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:58:46.642812 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:58:46.642817 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:58:46.642822 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:58:46.642828 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 10 00:58:46.642833 kernel: ACPI: Interpreter enabled May 10 00:58:46.642838 kernel: ACPI: PM: (supports S0 S1 S5) May 10 00:58:46.642843 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:58:46.642849 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:58:46.642854 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F May 10 00:58:46.642860 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) May 10 00:58:46.642930 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 00:58:46.642978 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] May 10 00:58:46.643021 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] May 10 00:58:46.643029 kernel: PCI host bridge to bus 0000:00 May 10 00:58:46.643073 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:58:46.643131 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] May 10 00:58:46.643170 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 00:58:46.643210 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:58:46.643248 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] May 10 00:58:46.643286 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] May 10 00:58:46.643338 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 May 10 00:58:46.643389 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 May 10 00:58:46.643442 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 May 10 00:58:46.643491 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a May 10 00:58:46.643535 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] May 10 00:58:46.643579 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 10 00:58:46.643622 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 10 00:58:46.643865 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 10 00:58:46.643926 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 10 00:58:46.643985 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 May 10 00:58:46.644036 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI May 10 00:58:46.644092 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB May 10 00:58:46.644727 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 May 10 00:58:46.644814 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] May 10 00:58:46.644863 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] May 10 00:58:46.644915 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 May 10 00:58:46.644964 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] May 10 00:58:46.645010 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] May 10 00:58:46.645054 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] May 10 00:58:46.645112 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] May 10 00:58:46.645188 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:58:46.645235 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 May 10 00:58:46.645286 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.645330 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold May 10 00:58:46.645379 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.645426 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold May 10 00:58:46.645478 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.645523 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold May 10 00:58:46.645574 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.645618 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold May 10 00:58:46.645665 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.645708 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold May 10 00:58:46.645755 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.645800 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold May 10 00:58:46.645849 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.645893 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold May 10 00:58:46.645941 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.645985 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold May 10 00:58:46.646033 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.646076 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold May 10 00:58:46.648200 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.648250 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold May 10 00:58:46.648300 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.648346 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold May 10 00:58:46.648397 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.648444 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold May 10 00:58:46.648491 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.648536 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold May 10 00:58:46.648584 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.648628 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold May 10 00:58:46.648676 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.648720 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold May 10 00:58:46.648786 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.648843 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold May 10 00:58:46.648891 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.648935 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold May 10 00:58:46.648983 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.649027 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold May 10 00:58:46.651298 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.651362 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold May 10 00:58:46.651418 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.651465 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold May 10 00:58:46.651513 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.651558 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold May 10 00:58:46.651608 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.651652 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold May 10 00:58:46.651700 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.651744 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold May 10 00:58:46.651791 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.651835 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold May 10 00:58:46.651881 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.651927 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold May 10 00:58:46.651974 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.652018 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold May 10 00:58:46.652066 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.652139 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold May 10 00:58:46.652204 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.652252 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold May 10 00:58:46.652298 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.652342 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold May 10 00:58:46.652389 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.652434 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold May 10 00:58:46.652483 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.652529 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold May 10 00:58:46.652576 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 May 10 00:58:46.652620 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold May 10 00:58:46.652667 kernel: pci_bus 0000:01: extended config space not accessible May 10 00:58:46.652711 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 10 00:58:46.652776 kernel: pci_bus 0000:02: extended config space not accessible May 10 00:58:46.652787 kernel: acpiphp: Slot [32] registered May 10 00:58:46.652806 kernel: acpiphp: Slot [33] registered May 10 00:58:46.652812 kernel: acpiphp: Slot [34] registered May 10 00:58:46.652817 kernel: acpiphp: Slot [35] registered May 10 00:58:46.652822 kernel: acpiphp: Slot [36] registered May 10 00:58:46.652827 kernel: acpiphp: Slot [37] registered May 10 00:58:46.652832 kernel: acpiphp: Slot [38] registered May 10 00:58:46.652838 kernel: acpiphp: Slot [39] registered May 10 00:58:46.652843 kernel: acpiphp: Slot [40] registered May 10 00:58:46.652848 kernel: acpiphp: Slot [41] registered May 10 00:58:46.652854 kernel: acpiphp: Slot [42] registered May 10 00:58:46.652859 kernel: acpiphp: Slot [43] registered May 10 00:58:46.652865 kernel: acpiphp: Slot [44] registered May 10 00:58:46.652870 kernel: acpiphp: Slot [45] registered May 10 00:58:46.652875 kernel: acpiphp: Slot [46] registered May 10 00:58:46.652880 kernel: acpiphp: Slot [47] registered May 10 00:58:46.652886 kernel: acpiphp: Slot [48] registered May 10 00:58:46.652891 kernel: acpiphp: Slot [49] registered May 10 00:58:46.652896 kernel: acpiphp: Slot [50] registered May 10 00:58:46.652902 kernel: acpiphp: Slot [51] registered May 10 00:58:46.652907 kernel: acpiphp: Slot [52] registered May 10 00:58:46.652913 kernel: acpiphp: Slot [53] registered May 10 00:58:46.652918 kernel: acpiphp: Slot [54] registered May 10 00:58:46.652923 kernel: acpiphp: Slot [55] registered May 10 00:58:46.652928 kernel: acpiphp: Slot [56] registered May 10 00:58:46.652933 kernel: acpiphp: Slot [57] registered May 10 00:58:46.652938 kernel: acpiphp: Slot [58] registered May 10 00:58:46.652943 kernel: acpiphp: Slot [59] registered May 10 00:58:46.652948 kernel: acpiphp: Slot [60] registered May 10 00:58:46.652954 kernel: acpiphp: Slot [61] registered May 10 00:58:46.652960 kernel: acpiphp: Slot [62] registered May 10 00:58:46.652965 kernel: acpiphp: Slot [63] registered May 10 00:58:46.653010 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) May 10 00:58:46.653056 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 10 00:58:46.653106 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 10 00:58:46.653150 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 10 00:58:46.653192 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) May 10 00:58:46.653238 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) May 10 00:58:46.653281 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) May 10 00:58:46.653323 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) May 10 00:58:46.653366 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) May 10 00:58:46.653415 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 May 10 00:58:46.653461 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] May 10 00:58:46.653506 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] May 10 00:58:46.653553 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 10 00:58:46.653597 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold May 10 00:58:46.653641 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 10 00:58:46.653684 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 10 00:58:46.653728 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 10 00:58:46.653776 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 10 00:58:46.653821 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 10 00:58:46.653867 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 10 00:58:46.653911 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 10 00:58:46.653955 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 10 00:58:46.653998 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 10 00:58:46.654042 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 10 00:58:46.656141 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 10 00:58:46.656199 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 10 00:58:46.656248 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 10 00:58:46.656297 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 10 00:58:46.656342 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 10 00:58:46.656387 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 10 00:58:46.656431 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 10 00:58:46.656474 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 10 00:58:46.656521 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 10 00:58:46.656564 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 10 00:58:46.656608 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 10 00:58:46.656652 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 10 00:58:46.656695 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 10 00:58:46.656739 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 10 00:58:46.656821 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 10 00:58:46.656882 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 10 00:58:46.656925 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 10 00:58:46.656979 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 May 10 00:58:46.657024 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] May 10 00:58:46.657070 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] May 10 00:58:46.657127 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] May 10 00:58:46.657174 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] May 10 00:58:46.657218 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 10 00:58:46.657295 kernel: pci 0000:0b:00.0: supports D1 D2 May 10 00:58:46.657339 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 10 00:58:46.657383 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 10 00:58:46.657427 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 10 00:58:46.657471 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 10 00:58:46.657515 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 10 00:58:46.657558 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 10 00:58:46.657601 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 10 00:58:46.657648 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 10 00:58:46.657691 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 10 00:58:46.657736 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 10 00:58:46.657784 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 10 00:58:46.657830 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 10 00:58:46.657874 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 10 00:58:46.657917 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 10 00:58:46.657964 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 10 00:58:46.658007 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 10 00:58:46.658052 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 10 00:58:46.658103 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 10 00:58:46.658147 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 10 00:58:46.658191 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 10 00:58:46.658235 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 10 00:58:46.658278 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 10 00:58:46.658323 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 10 00:58:46.658367 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 10 00:58:46.658410 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 10 00:58:46.658454 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 10 00:58:46.658497 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 10 00:58:46.658541 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 10 00:58:46.658586 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 10 00:58:46.658629 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 10 00:58:46.658674 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 10 00:58:46.658719 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 10 00:58:46.658770 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 10 00:58:46.658820 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 10 00:58:46.658865 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 10 00:58:46.658909 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 10 00:58:46.658953 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 10 00:58:46.658997 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 10 00:58:46.659043 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 10 00:58:46.659093 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 10 00:58:46.659139 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 10 00:58:46.659183 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 10 00:58:46.659226 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 10 00:58:46.659271 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 10 00:58:46.659314 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 10 00:58:46.659360 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 10 00:58:46.659404 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 10 00:58:46.659447 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 10 00:58:46.659491 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 10 00:58:46.659535 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 10 00:58:46.659578 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 10 00:58:46.659622 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 10 00:58:46.659665 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 10 00:58:46.659710 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 10 00:58:46.659754 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 10 00:58:46.659797 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 10 00:58:46.659841 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 10 00:58:46.659884 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 10 00:58:46.659926 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 10 00:58:46.659970 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 10 00:58:46.660014 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 10 00:58:46.660060 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 10 00:58:46.660112 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 10 00:58:46.660156 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 10 00:58:46.660215 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 10 00:58:46.660272 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 10 00:58:46.665120 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 10 00:58:46.665183 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 10 00:58:46.665234 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 10 00:58:46.665288 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 10 00:58:46.665336 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 10 00:58:46.665384 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 10 00:58:46.665431 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 10 00:58:46.665478 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 10 00:58:46.665524 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 10 00:58:46.665571 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 10 00:58:46.665618 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 10 00:58:46.665668 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 10 00:58:46.665715 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 10 00:58:46.665761 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 10 00:58:46.665808 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 10 00:58:46.665816 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 May 10 00:58:46.665821 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 May 10 00:58:46.665827 kernel: ACPI: PCI: Interrupt link LNKB disabled May 10 00:58:46.665832 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:58:46.665839 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 May 10 00:58:46.665844 kernel: iommu: Default domain type: Translated May 10 00:58:46.665850 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:58:46.665896 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device May 10 00:58:46.665943 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:58:46.665989 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible May 10 00:58:46.665997 kernel: vgaarb: loaded May 10 00:58:46.666003 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:58:46.666008 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:58:46.666015 kernel: PTP clock support registered May 10 00:58:46.666020 kernel: PCI: Using ACPI for IRQ routing May 10 00:58:46.666026 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:58:46.666031 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] May 10 00:58:46.666036 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] May 10 00:58:46.666041 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 May 10 00:58:46.666047 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter May 10 00:58:46.666052 kernel: clocksource: Switched to clocksource tsc-early May 10 00:58:46.666057 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:58:46.666064 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:58:46.666069 kernel: pnp: PnP ACPI init May 10 00:58:46.666131 kernel: system 00:00: [io 0x1000-0x103f] has been reserved May 10 00:58:46.666177 kernel: system 00:00: [io 0x1040-0x104f] has been reserved May 10 00:58:46.666220 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved May 10 00:58:46.666267 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved May 10 00:58:46.666313 kernel: pnp 00:06: [dma 2] May 10 00:58:46.666393 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved May 10 00:58:46.666436 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved May 10 00:58:46.666480 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved May 10 00:58:46.666487 kernel: pnp: PnP ACPI: found 8 devices May 10 00:58:46.666493 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:58:46.666499 kernel: NET: Registered PF_INET protocol family May 10 00:58:46.666504 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:58:46.666509 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 00:58:46.666516 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:58:46.666522 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:58:46.666527 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 00:58:46.666533 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 00:58:46.666538 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:58:46.666544 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:58:46.666549 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:58:46.666554 kernel: NET: Registered PF_XDP protocol family May 10 00:58:46.666602 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 May 10 00:58:46.666653 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 10 00:58:46.666701 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 10 00:58:46.666749 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 10 00:58:46.666847 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 10 00:58:46.666894 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 May 10 00:58:46.666945 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 May 10 00:58:46.666993 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 May 10 00:58:46.667040 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 May 10 00:58:46.667098 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 May 10 00:58:46.667149 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 May 10 00:58:46.667197 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 May 10 00:58:46.667247 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 May 10 00:58:46.667295 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 May 10 00:58:46.667342 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 May 10 00:58:46.667390 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 May 10 00:58:46.667438 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 May 10 00:58:46.667485 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 May 10 00:58:46.667534 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 May 10 00:58:46.667581 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 May 10 00:58:46.667629 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 May 10 00:58:46.667676 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 May 10 00:58:46.667723 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 May 10 00:58:46.667774 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] May 10 00:58:46.667824 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] May 10 00:58:46.667871 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 10 00:58:46.667943 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668021 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668069 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668165 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668216 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668264 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668314 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668361 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668407 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668453 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668500 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668546 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668592 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668639 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668688 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668734 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668810 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668857 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668903 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.668949 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 10 00:58:46.668996 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669043 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669124 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669174 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669221 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669267 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669315 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669379 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669439 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669486 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669536 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669583 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669629 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669676 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669722 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669769 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669816 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669862 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 10 00:58:46.669911 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.669958 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670004 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670051 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670109 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670158 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670206 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670253 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670300 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670350 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670398 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670445 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670493 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670550 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670605 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670652 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670699 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670745 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670799 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670846 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670893 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.670940 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 10 00:58:46.670987 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.671034 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 10 00:58:46.671087 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678161 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678213 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678260 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678308 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678354 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678399 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678459 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678533 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678590 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678634 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678677 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678721 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678767 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678811 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678855 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678899 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.678944 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 10 00:58:46.678989 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.679033 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 10 00:58:46.679076 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 10 00:58:46.679130 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 10 00:58:46.679174 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] May 10 00:58:46.679220 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 10 00:58:46.679262 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 10 00:58:46.679305 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 10 00:58:46.679351 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] May 10 00:58:46.679396 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 10 00:58:46.679440 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 10 00:58:46.679499 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 10 00:58:46.679544 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] May 10 00:58:46.679603 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 10 00:58:46.679646 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 10 00:58:46.679689 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 10 00:58:46.679732 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 10 00:58:46.679780 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 10 00:58:46.679824 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 10 00:58:46.679867 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 10 00:58:46.679910 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 10 00:58:46.679954 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 10 00:58:46.680000 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 10 00:58:46.680043 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 10 00:58:46.680092 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 10 00:58:46.680137 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 10 00:58:46.680180 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 10 00:58:46.680226 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 10 00:58:46.680272 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 10 00:58:46.680315 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 10 00:58:46.680360 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 10 00:58:46.680403 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 10 00:58:46.680446 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 10 00:58:46.680490 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 10 00:58:46.680534 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 10 00:58:46.680577 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 10 00:58:46.680623 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] May 10 00:58:46.680669 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 10 00:58:46.680713 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 10 00:58:46.680776 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 10 00:58:46.680834 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] May 10 00:58:46.680878 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 10 00:58:46.680922 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 10 00:58:46.680965 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 10 00:58:46.681008 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 10 00:58:46.681052 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 10 00:58:46.681102 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 10 00:58:46.681164 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 10 00:58:46.681233 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 10 00:58:46.681303 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 10 00:58:46.681362 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 10 00:58:46.681406 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 10 00:58:46.681450 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 10 00:58:46.681494 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 10 00:58:46.681539 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 10 00:58:46.681583 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 10 00:58:46.681629 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 10 00:58:46.681706 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 10 00:58:46.681767 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 10 00:58:46.681811 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 10 00:58:46.681855 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 10 00:58:46.681898 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 10 00:58:46.681941 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 10 00:58:46.681984 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 10 00:58:46.682028 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 10 00:58:46.682071 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 10 00:58:46.682130 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 10 00:58:46.682173 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 10 00:58:46.682216 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 10 00:58:46.682258 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 10 00:58:46.682301 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 10 00:58:46.682345 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 10 00:58:46.682388 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 10 00:58:46.682432 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 10 00:58:46.682475 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 10 00:58:46.682521 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 10 00:58:46.682566 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 10 00:58:46.682609 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 10 00:58:46.682653 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 10 00:58:46.682696 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 10 00:58:46.682740 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 10 00:58:46.682783 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 10 00:58:46.682827 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 10 00:58:46.682870 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 10 00:58:46.682914 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 10 00:58:46.682959 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 10 00:58:46.683002 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 10 00:58:46.683046 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 10 00:58:46.683099 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 10 00:58:46.683146 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 10 00:58:46.683190 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 10 00:58:46.683234 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 10 00:58:46.683278 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 10 00:58:46.683321 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 10 00:58:46.683366 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 10 00:58:46.683410 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 10 00:58:46.683453 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 10 00:58:46.683497 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 10 00:58:46.683539 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 10 00:58:46.683583 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 10 00:58:46.683627 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 10 00:58:46.683671 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 10 00:58:46.683715 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 10 00:58:46.683765 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 10 00:58:46.683813 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 10 00:58:46.683857 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 10 00:58:46.683900 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 10 00:58:46.683943 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 10 00:58:46.683994 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 10 00:58:46.684038 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 10 00:58:46.684089 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 10 00:58:46.684136 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 10 00:58:46.684179 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 10 00:58:46.684241 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 10 00:58:46.684286 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 10 00:58:46.684329 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 10 00:58:46.684373 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 10 00:58:46.684416 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] May 10 00:58:46.684456 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] May 10 00:58:46.684495 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] May 10 00:58:46.684535 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] May 10 00:58:46.684574 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] May 10 00:58:46.684619 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] May 10 00:58:46.684661 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] May 10 00:58:46.684702 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] May 10 00:58:46.684743 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] May 10 00:58:46.684821 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] May 10 00:58:46.684864 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] May 10 00:58:46.684905 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] May 10 00:58:46.684948 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] May 10 00:58:46.684994 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] May 10 00:58:46.685036 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] May 10 00:58:46.685076 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] May 10 00:58:46.687168 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] May 10 00:58:46.687214 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] May 10 00:58:46.687257 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] May 10 00:58:46.687304 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] May 10 00:58:46.687347 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] May 10 00:58:46.687387 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] May 10 00:58:46.687432 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] May 10 00:58:46.687474 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] May 10 00:58:46.687518 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] May 10 00:58:46.687561 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] May 10 00:58:46.687608 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] May 10 00:58:46.687649 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] May 10 00:58:46.687694 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] May 10 00:58:46.687735 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] May 10 00:58:46.687784 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] May 10 00:58:46.687828 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] May 10 00:58:46.687872 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] May 10 00:58:46.687913 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] May 10 00:58:46.687953 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] May 10 00:58:46.687997 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] May 10 00:58:46.688038 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] May 10 00:58:46.688088 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] May 10 00:58:46.688142 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] May 10 00:58:46.688185 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] May 10 00:58:46.688226 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] May 10 00:58:46.688272 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] May 10 00:58:46.688314 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] May 10 00:58:46.688358 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] May 10 00:58:46.688402 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] May 10 00:58:46.688446 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] May 10 00:58:46.688488 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] May 10 00:58:46.688534 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] May 10 00:58:46.688575 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] May 10 00:58:46.688620 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] May 10 00:58:46.688664 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] May 10 00:58:46.688709 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] May 10 00:58:46.688752 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] May 10 00:58:46.688793 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] May 10 00:58:46.688839 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] May 10 00:58:46.688880 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] May 10 00:58:46.688921 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] May 10 00:58:46.688970 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] May 10 00:58:46.689012 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] May 10 00:58:46.689053 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] May 10 00:58:46.689559 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] May 10 00:58:46.689610 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] May 10 00:58:46.689658 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] May 10 00:58:46.689703 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] May 10 00:58:46.689748 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] May 10 00:58:46.689797 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] May 10 00:58:46.689842 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] May 10 00:58:46.689885 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] May 10 00:58:46.689931 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] May 10 00:58:46.689972 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] May 10 00:58:46.690023 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] May 10 00:58:46.690065 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] May 10 00:58:46.690114 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] May 10 00:58:46.690159 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] May 10 00:58:46.690201 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] May 10 00:58:46.690242 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] May 10 00:58:46.690290 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] May 10 00:58:46.690333 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] May 10 00:58:46.690379 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] May 10 00:58:46.690421 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] May 10 00:58:46.690466 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] May 10 00:58:46.690507 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] May 10 00:58:46.690555 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] May 10 00:58:46.690597 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] May 10 00:58:46.690646 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] May 10 00:58:46.690688 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] May 10 00:58:46.690733 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] May 10 00:58:46.690778 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] May 10 00:58:46.690829 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:58:46.690838 kernel: PCI: CLS 32 bytes, default 64 May 10 00:58:46.690845 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:58:46.690851 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 10 00:58:46.690857 kernel: clocksource: Switched to clocksource tsc May 10 00:58:46.690863 kernel: Initialise system trusted keyrings May 10 00:58:46.690869 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 00:58:46.690874 kernel: Key type asymmetric registered May 10 00:58:46.690882 kernel: Asymmetric key parser 'x509' registered May 10 00:58:46.690887 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:58:46.690893 kernel: io scheduler mq-deadline registered May 10 00:58:46.690899 kernel: io scheduler kyber registered May 10 00:58:46.690904 kernel: io scheduler bfq registered May 10 00:58:46.690951 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 May 10 00:58:46.690998 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691044 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 May 10 00:58:46.691100 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691152 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 May 10 00:58:46.691196 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691242 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 May 10 00:58:46.691287 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691333 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 May 10 00:58:46.691378 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691426 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 May 10 00:58:46.691472 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691516 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 May 10 00:58:46.691562 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691606 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 May 10 00:58:46.691654 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691699 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 May 10 00:58:46.691743 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691788 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 May 10 00:58:46.691833 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691878 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 May 10 00:58:46.691923 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.691970 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 May 10 00:58:46.692015 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692060 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 May 10 00:58:46.692111 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692156 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 May 10 00:58:46.692204 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692249 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 May 10 00:58:46.692294 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692340 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 May 10 00:58:46.692385 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692430 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 May 10 00:58:46.692477 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692522 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 May 10 00:58:46.692566 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692613 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 May 10 00:58:46.692658 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692702 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 May 10 00:58:46.692747 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692800 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 May 10 00:58:46.692846 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692891 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 May 10 00:58:46.692936 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.692981 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 May 10 00:58:46.693028 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693072 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 May 10 00:58:46.693127 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693172 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 May 10 00:58:46.693217 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693262 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 May 10 00:58:46.693310 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693354 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 May 10 00:58:46.693399 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693443 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 May 10 00:58:46.693488 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693532 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 May 10 00:58:46.693580 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693624 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 May 10 00:58:46.693669 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693713 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 May 10 00:58:46.693763 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693811 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 May 10 00:58:46.693856 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 10 00:58:46.693864 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:58:46.693871 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:58:46.693877 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:58:46.693882 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 May 10 00:58:46.693888 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:58:46.693896 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:58:46.693942 kernel: rtc_cmos 00:01: registered as rtc0 May 10 00:58:46.693984 kernel: rtc_cmos 00:01: setting system clock to 2025-05-10T00:58:46 UTC (1746838726) May 10 00:58:46.693993 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:58:46.694032 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram May 10 00:58:46.694040 kernel: intel_pstate: CPU model not supported May 10 00:58:46.694046 kernel: NET: Registered PF_INET6 protocol family May 10 00:58:46.694051 kernel: Segment Routing with IPv6 May 10 00:58:46.694058 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:58:46.694064 kernel: NET: Registered PF_PACKET protocol family May 10 00:58:46.694070 kernel: Key type dns_resolver registered May 10 00:58:46.694076 kernel: IPI shorthand broadcast: enabled May 10 00:58:46.694180 kernel: sched_clock: Marking stable (802152934, 210073732)->(1064942757, -52716091) May 10 00:58:46.694187 kernel: registered taskstats version 1 May 10 00:58:46.694193 kernel: Loading compiled-in X.509 certificates May 10 00:58:46.694199 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:58:46.694204 kernel: Key type .fscrypt registered May 10 00:58:46.694212 kernel: Key type fscrypt-provisioning registered May 10 00:58:46.694218 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:58:46.694223 kernel: ima: Allocated hash algorithm: sha1 May 10 00:58:46.694229 kernel: ima: No architecture policies found May 10 00:58:46.694235 kernel: clk: Disabling unused clocks May 10 00:58:46.694240 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:58:46.694246 kernel: Write protecting the kernel read-only data: 28672k May 10 00:58:46.694252 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:58:46.694258 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:58:46.694265 kernel: Run /init as init process May 10 00:58:46.694271 kernel: with arguments: May 10 00:58:46.694278 kernel: /init May 10 00:58:46.694284 kernel: with environment: May 10 00:58:46.694289 kernel: HOME=/ May 10 00:58:46.694295 kernel: TERM=linux May 10 00:58:46.694301 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:58:46.694308 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:58:46.694316 systemd[1]: Detected virtualization vmware. May 10 00:58:46.694322 systemd[1]: Detected architecture x86-64. May 10 00:58:46.694328 systemd[1]: Running in initrd. May 10 00:58:46.694334 systemd[1]: No hostname configured, using default hostname. May 10 00:58:46.694340 systemd[1]: Hostname set to . May 10 00:58:46.694346 systemd[1]: Initializing machine ID from random generator. May 10 00:58:46.694352 systemd[1]: Queued start job for default target initrd.target. May 10 00:58:46.694358 systemd[1]: Started systemd-ask-password-console.path. May 10 00:58:46.694364 systemd[1]: Reached target cryptsetup.target. May 10 00:58:46.694370 systemd[1]: Reached target paths.target. May 10 00:58:46.694376 systemd[1]: Reached target slices.target. May 10 00:58:46.694382 systemd[1]: Reached target swap.target. May 10 00:58:46.694387 systemd[1]: Reached target timers.target. May 10 00:58:46.694394 systemd[1]: Listening on iscsid.socket. May 10 00:58:46.694399 systemd[1]: Listening on iscsiuio.socket. May 10 00:58:46.694405 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:58:46.694412 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:58:46.694418 systemd[1]: Listening on systemd-journald.socket. May 10 00:58:46.694424 systemd[1]: Listening on systemd-networkd.socket. May 10 00:58:46.694430 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:58:46.694727 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:58:46.694735 systemd[1]: Reached target sockets.target. May 10 00:58:46.694742 systemd[1]: Starting kmod-static-nodes.service... May 10 00:58:46.694748 systemd[1]: Finished network-cleanup.service. May 10 00:58:46.694759 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:58:46.694767 systemd[1]: Starting systemd-journald.service... May 10 00:58:46.694773 systemd[1]: Starting systemd-modules-load.service... May 10 00:58:46.694779 systemd[1]: Starting systemd-resolved.service... May 10 00:58:46.694785 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:58:46.694791 systemd[1]: Finished kmod-static-nodes.service. May 10 00:58:46.694797 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:58:46.694803 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:58:46.694808 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:58:46.694815 kernel: audit: type=1130 audit(1746838726.636:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.694822 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:58:46.694828 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:58:46.694834 kernel: audit: type=1130 audit(1746838726.647:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.694840 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:58:46.694846 kernel: Bridge firewalling registered May 10 00:58:46.694852 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:58:46.694858 kernel: audit: type=1130 audit(1746838726.677:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.694864 systemd[1]: Starting dracut-cmdline.service... May 10 00:58:46.694870 systemd[1]: Started systemd-resolved.service. May 10 00:58:46.694876 kernel: audit: type=1130 audit(1746838726.689:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.694882 systemd[1]: Reached target nss-lookup.target. May 10 00:58:46.694892 systemd-journald[216]: Journal started May 10 00:58:46.694923 systemd-journald[216]: Runtime Journal (/run/log/journal/19790dffd03c49618c3ba74a21419699) is 4.8M, max 38.8M, 34.0M free. May 10 00:58:46.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.636874 systemd-modules-load[217]: Inserted module 'overlay' May 10 00:58:46.675873 systemd-modules-load[217]: Inserted module 'br_netfilter' May 10 00:58:46.698313 systemd[1]: Started systemd-journald.service. May 10 00:58:46.698325 kernel: audit: type=1130 audit(1746838726.694:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.685490 systemd-resolved[218]: Positive Trust Anchors: May 10 00:58:46.685497 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:58:46.685516 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:58:46.687072 systemd-resolved[218]: Defaulting to hostname 'linux'. May 10 00:58:46.699878 dracut-cmdline[234]: dracut-dracut-053 May 10 00:58:46.699878 dracut-cmdline[234]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 10 00:58:46.699878 dracut-cmdline[234]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:58:46.708092 kernel: SCSI subsystem initialized May 10 00:58:46.719142 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:58:46.719159 kernel: device-mapper: uevent: version 1.0.3 May 10 00:58:46.720184 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:58:46.724251 systemd-modules-load[217]: Inserted module 'dm_multipath' May 10 00:58:46.724541 systemd[1]: Finished systemd-modules-load.service. May 10 00:58:46.725032 systemd[1]: Starting systemd-sysctl.service... May 10 00:58:46.727887 kernel: audit: type=1130 audit(1746838726.723:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.731312 systemd[1]: Finished systemd-sysctl.service. May 10 00:58:46.734091 kernel: audit: type=1130 audit(1746838726.730:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.740089 kernel: Loading iSCSI transport class v2.0-870. May 10 00:58:46.752091 kernel: iscsi: registered transport (tcp) May 10 00:58:46.766092 kernel: iscsi: registered transport (qla4xxx) May 10 00:58:46.766108 kernel: QLogic iSCSI HBA Driver May 10 00:58:46.781469 systemd[1]: Finished dracut-cmdline.service. May 10 00:58:46.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.782028 systemd[1]: Starting dracut-pre-udev.service... May 10 00:58:46.785092 kernel: audit: type=1130 audit(1746838726.780:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:46.818092 kernel: raid6: avx2x4 gen() 51234 MB/s May 10 00:58:46.835092 kernel: raid6: avx2x4 xor() 22661 MB/s May 10 00:58:46.852089 kernel: raid6: avx2x2 gen() 55666 MB/s May 10 00:58:46.869091 kernel: raid6: avx2x2 xor() 33220 MB/s May 10 00:58:46.886089 kernel: raid6: avx2x1 gen() 47687 MB/s May 10 00:58:46.903089 kernel: raid6: avx2x1 xor() 29447 MB/s May 10 00:58:46.920089 kernel: raid6: sse2x4 gen() 22296 MB/s May 10 00:58:46.937090 kernel: raid6: sse2x4 xor() 12416 MB/s May 10 00:58:46.954089 kernel: raid6: sse2x2 gen() 22686 MB/s May 10 00:58:46.971089 kernel: raid6: sse2x2 xor() 14082 MB/s May 10 00:58:46.988089 kernel: raid6: sse2x1 gen() 19101 MB/s May 10 00:58:47.005181 kernel: raid6: sse2x1 xor() 9409 MB/s May 10 00:58:47.005194 kernel: raid6: using algorithm avx2x2 gen() 55666 MB/s May 10 00:58:47.005202 kernel: raid6: .... xor() 33220 MB/s, rmw enabled May 10 00:58:47.006294 kernel: raid6: using avx2x2 recovery algorithm May 10 00:58:47.014089 kernel: xor: automatically using best checksumming function avx May 10 00:58:47.070094 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:58:47.074416 systemd[1]: Finished dracut-pre-udev.service. May 10 00:58:47.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:47.075005 systemd[1]: Starting systemd-udevd.service... May 10 00:58:47.073000 audit: BPF prog-id=7 op=LOAD May 10 00:58:47.073000 audit: BPF prog-id=8 op=LOAD May 10 00:58:47.078095 kernel: audit: type=1130 audit(1746838727.073:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:47.084950 systemd-udevd[416]: Using default interface naming scheme 'v252'. May 10 00:58:47.087551 systemd[1]: Started systemd-udevd.service. May 10 00:58:47.087983 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:58:47.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:47.094839 dracut-pre-trigger[421]: rd.md=0: removing MD RAID activation May 10 00:58:47.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:47.109566 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:58:47.110033 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:58:47.167305 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:58:47.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:47.220088 kernel: VMware PVSCSI driver - version 1.0.7.0-k May 10 00:58:47.221830 kernel: vmw_pvscsi: using 64bit dma May 10 00:58:47.221846 kernel: vmw_pvscsi: max_id: 16 May 10 00:58:47.221853 kernel: vmw_pvscsi: setting ring_pages to 8 May 10 00:58:47.238099 kernel: vmw_pvscsi: enabling reqCallThreshold May 10 00:58:47.238116 kernel: vmw_pvscsi: driver-based request coalescing enabled May 10 00:58:47.238124 kernel: vmw_pvscsi: using MSI-X May 10 00:58:47.238131 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 May 10 00:58:47.240107 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 May 10 00:58:47.240926 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 May 10 00:58:47.244944 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI May 10 00:58:47.244982 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 May 10 00:58:47.248969 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps May 10 00:58:47.251091 kernel: libata version 3.00 loaded. May 10 00:58:47.253093 kernel: ata_piix 0000:00:07.1: version 2.13 May 10 00:58:47.269540 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 May 10 00:58:47.269609 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:58:47.269617 kernel: scsi host1: ata_piix May 10 00:58:47.269677 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) May 10 00:58:47.276667 kernel: sd 0:0:0:0: [sda] Write Protect is off May 10 00:58:47.276736 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 May 10 00:58:47.276796 kernel: sd 0:0:0:0: [sda] Cache data unavailable May 10 00:58:47.276852 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through May 10 00:58:47.276910 kernel: scsi host2: ata_piix May 10 00:58:47.276966 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 May 10 00:58:47.276974 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 May 10 00:58:47.276981 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:58:47.276988 kernel: AES CTR mode by8 optimization enabled May 10 00:58:47.276995 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:58:47.277001 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 10 00:58:47.438094 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 May 10 00:58:47.443395 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 May 10 00:58:47.470650 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray May 10 00:58:47.486499 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:58:47.486510 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (464) May 10 00:58:47.486518 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 10 00:58:47.476408 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:58:47.481691 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:58:47.483158 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:58:47.483258 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:58:47.485754 systemd[1]: Starting disk-uuid.service... May 10 00:58:47.490027 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:58:47.511099 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:58:47.517096 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:58:48.517018 disk-uuid[550]: The operation has completed successfully. May 10 00:58:48.517325 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:58:48.550462 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:58:48.550521 systemd[1]: Finished disk-uuid.service. May 10 00:58:48.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.551111 systemd[1]: Starting verity-setup.service... May 10 00:58:48.561093 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:58:48.600848 systemd[1]: Found device dev-mapper-usr.device. May 10 00:58:48.601651 systemd[1]: Mounting sysusr-usr.mount... May 10 00:58:48.603500 systemd[1]: Finished verity-setup.service. May 10 00:58:48.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.651661 systemd[1]: Mounted sysusr-usr.mount. May 10 00:58:48.652089 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:58:48.652198 systemd[1]: Starting afterburn-network-kargs.service... May 10 00:58:48.652610 systemd[1]: Starting ignition-setup.service... May 10 00:58:48.667073 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:58:48.667098 kernel: BTRFS info (device sda6): using free space tree May 10 00:58:48.667107 kernel: BTRFS info (device sda6): has skinny extents May 10 00:58:48.671414 kernel: BTRFS info (device sda6): enabling ssd optimizations May 10 00:58:48.675187 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:58:48.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.680509 systemd[1]: Finished ignition-setup.service. May 10 00:58:48.681050 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:58:48.731783 systemd[1]: Finished afterburn-network-kargs.service. May 10 00:58:48.732473 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:58:48.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.780000 audit: BPF prog-id=9 op=LOAD May 10 00:58:48.780636 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:58:48.781452 systemd[1]: Starting systemd-networkd.service... May 10 00:58:48.794293 systemd-networkd[736]: lo: Link UP May 10 00:58:48.794297 systemd-networkd[736]: lo: Gained carrier May 10 00:58:48.794566 systemd-networkd[736]: Enumeration completed May 10 00:58:48.794759 systemd-networkd[736]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. May 10 00:58:48.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.795055 systemd[1]: Started systemd-networkd.service. May 10 00:58:48.795199 systemd[1]: Reached target network.target. May 10 00:58:48.797614 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 10 00:58:48.797707 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 10 00:58:48.795665 systemd[1]: Starting iscsiuio.service... May 10 00:58:48.800122 systemd[1]: Started iscsiuio.service. May 10 00:58:48.800574 systemd-networkd[736]: ens192: Link UP May 10 00:58:48.800578 systemd-networkd[736]: ens192: Gained carrier May 10 00:58:48.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.801561 systemd[1]: Starting iscsid.service... May 10 00:58:48.803572 iscsid[741]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:58:48.803572 iscsid[741]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:58:48.803572 iscsid[741]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:58:48.803572 iscsid[741]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:58:48.803572 iscsid[741]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:58:48.804814 iscsid[741]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:58:48.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.805005 systemd[1]: Started iscsid.service. May 10 00:58:48.805901 systemd[1]: Starting dracut-initqueue.service... May 10 00:58:48.812271 systemd[1]: Finished dracut-initqueue.service. May 10 00:58:48.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.812536 systemd[1]: Reached target remote-fs-pre.target. May 10 00:58:48.812761 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:58:48.813232 systemd[1]: Reached target remote-fs.target. May 10 00:58:48.813767 systemd[1]: Starting dracut-pre-mount.service... May 10 00:58:48.816958 ignition[607]: Ignition 2.14.0 May 10 00:58:48.816964 ignition[607]: Stage: fetch-offline May 10 00:58:48.816992 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:58:48.817005 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 10 00:58:48.818659 systemd[1]: Finished dracut-pre-mount.service. May 10 00:58:48.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.820309 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 10 00:58:48.820378 ignition[607]: parsed url from cmdline: "" May 10 00:58:48.820380 ignition[607]: no config URL provided May 10 00:58:48.820382 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:58:48.820387 ignition[607]: no config at "/usr/lib/ignition/user.ign" May 10 00:58:48.828342 ignition[607]: config successfully fetched May 10 00:58:48.828364 ignition[607]: parsing config with SHA512: 5b7b8b7726db882edf860680964ca89a4f3eb35b6ea3068cb17a6b05d5421d7eabc5e05f7086248e3132278f56254cc17c57e1bd2770ae8de4fad5cd63fc9824 May 10 00:58:48.832883 unknown[607]: fetched base config from "system" May 10 00:58:48.832889 unknown[607]: fetched user config from "vmware" May 10 00:58:48.833177 ignition[607]: fetch-offline: fetch-offline passed May 10 00:58:48.833217 ignition[607]: Ignition finished successfully May 10 00:58:48.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.833836 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:58:48.833968 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 10 00:58:48.834343 systemd[1]: Starting ignition-kargs.service... May 10 00:58:48.839223 ignition[755]: Ignition 2.14.0 May 10 00:58:48.839412 ignition[755]: Stage: kargs May 10 00:58:48.839571 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:58:48.839720 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 10 00:58:48.840950 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 10 00:58:48.842559 ignition[755]: kargs: kargs passed May 10 00:58:48.842697 ignition[755]: Ignition finished successfully May 10 00:58:48.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.843503 systemd[1]: Finished ignition-kargs.service. May 10 00:58:48.844014 systemd[1]: Starting ignition-disks.service... May 10 00:58:48.847906 ignition[761]: Ignition 2.14.0 May 10 00:58:48.847912 ignition[761]: Stage: disks May 10 00:58:48.847965 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:58:48.847976 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 10 00:58:48.849184 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 10 00:58:48.850411 ignition[761]: disks: disks passed May 10 00:58:48.850439 ignition[761]: Ignition finished successfully May 10 00:58:48.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.850978 systemd[1]: Finished ignition-disks.service. May 10 00:58:48.851124 systemd[1]: Reached target initrd-root-device.target. May 10 00:58:48.851217 systemd[1]: Reached target local-fs-pre.target. May 10 00:58:48.851299 systemd[1]: Reached target local-fs.target. May 10 00:58:48.851377 systemd[1]: Reached target sysinit.target. May 10 00:58:48.851454 systemd[1]: Reached target basic.target. May 10 00:58:48.851930 systemd[1]: Starting systemd-fsck-root.service... May 10 00:58:48.861894 systemd-fsck[769]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 10 00:58:48.863131 systemd[1]: Finished systemd-fsck-root.service. May 10 00:58:48.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.863609 systemd[1]: Mounting sysroot.mount... May 10 00:58:48.871088 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:58:48.871572 systemd[1]: Mounted sysroot.mount. May 10 00:58:48.871692 systemd[1]: Reached target initrd-root-fs.target. May 10 00:58:48.872486 systemd[1]: Mounting sysroot-usr.mount... May 10 00:58:48.872815 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:58:48.872835 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:58:48.872849 systemd[1]: Reached target ignition-diskful.target. May 10 00:58:48.873986 systemd[1]: Mounted sysroot-usr.mount. May 10 00:58:48.874506 systemd[1]: Starting initrd-setup-root.service... May 10 00:58:48.877203 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:58:48.880698 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory May 10 00:58:48.883661 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:58:48.886281 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:58:48.913628 systemd[1]: Finished initrd-setup-root.service. May 10 00:58:48.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.914129 systemd[1]: Starting ignition-mount.service... May 10 00:58:48.914533 systemd[1]: Starting sysroot-boot.service... May 10 00:58:48.918101 bash[820]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:58:48.922807 ignition[821]: INFO : Ignition 2.14.0 May 10 00:58:48.923011 ignition[821]: INFO : Stage: mount May 10 00:58:48.923196 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:58:48.923342 ignition[821]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 10 00:58:48.924747 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 10 00:58:48.928708 ignition[821]: INFO : mount: mount passed May 10 00:58:48.928818 ignition[821]: INFO : Ignition finished successfully May 10 00:58:48.929320 systemd[1]: Finished ignition-mount.service. May 10 00:58:48.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:48.933699 systemd[1]: Finished sysroot-boot.service. May 10 00:58:48.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:49.615362 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:58:49.625241 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (830) May 10 00:58:49.625266 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:58:49.625278 kernel: BTRFS info (device sda6): using free space tree May 10 00:58:49.627101 kernel: BTRFS info (device sda6): has skinny extents May 10 00:58:49.631093 kernel: BTRFS info (device sda6): enabling ssd optimizations May 10 00:58:49.632468 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:58:49.633259 systemd[1]: Starting ignition-files.service... May 10 00:58:49.644337 ignition[850]: INFO : Ignition 2.14.0 May 10 00:58:49.644337 ignition[850]: INFO : Stage: files May 10 00:58:49.644729 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:58:49.644729 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 10 00:58:49.646092 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 10 00:58:49.649159 ignition[850]: DEBUG : files: compiled without relabeling support, skipping May 10 00:58:49.649543 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:58:49.649543 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:58:49.652053 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:58:49.652295 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:58:49.652736 unknown[850]: wrote ssh authorized keys file for user: core May 10 00:58:49.653226 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:58:49.653687 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:58:49.653687 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:58:49.701700 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:58:49.807550 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:58:49.807873 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:58:49.808256 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:58:49.808486 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:58:49.808794 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:58:49.809026 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:58:49.809544 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:58:49.809781 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:58:49.810470 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:58:49.810930 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:58:49.811144 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:58:49.811144 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:58:49.811144 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:58:49.811821 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 10 00:58:49.811821 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:58:49.815199 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2511332838" May 10 00:58:49.815408 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2511332838": device or resource busy May 10 00:58:49.815408 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2511332838", trying btrfs: device or resource busy May 10 00:58:49.815408 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2511332838" May 10 00:58:49.815408 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2511332838" May 10 00:58:49.816979 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2511332838" May 10 00:58:49.816979 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2511332838" May 10 00:58:49.816979 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 10 00:58:49.816979 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:58:49.816979 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 10 00:58:50.391494 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 10 00:58:50.439278 systemd-networkd[736]: ens192: Gained IPv6LL May 10 00:58:51.428446 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:58:51.428919 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 10 00:58:51.428919 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 10 00:58:51.428919 ignition[850]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" May 10 00:58:51.428919 ignition[850]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" May 10 00:58:51.428919 ignition[850]: INFO : files: op(11): [started] processing unit "prepare-helm.service" May 10 00:58:51.428919 ignition[850]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:58:51.428919 ignition[850]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:58:51.428919 ignition[850]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" May 10 00:58:51.428919 ignition[850]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" May 10 00:58:51.430907 ignition[850]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:58:51.430907 ignition[850]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 10 00:58:51.430907 ignition[850]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" May 10 00:58:51.430907 ignition[850]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" May 10 00:58:51.430907 ignition[850]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:58:51.430907 ignition[850]: INFO : files: op(16): [started] setting preset to disabled for "coreos-metadata.service" May 10 00:58:51.430907 ignition[850]: INFO : files: op(16): op(17): [started] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:58:51.479567 ignition[850]: INFO : files: op(16): op(17): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 10 00:58:51.479786 ignition[850]: INFO : files: op(16): [finished] setting preset to disabled for "coreos-metadata.service" May 10 00:58:51.479786 ignition[850]: INFO : files: op(18): [started] setting preset to enabled for "vmtoolsd.service" May 10 00:58:51.479786 ignition[850]: INFO : files: op(18): [finished] setting preset to enabled for "vmtoolsd.service" May 10 00:58:51.479786 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:58:51.479786 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:58:51.479786 ignition[850]: INFO : files: files passed May 10 00:58:51.480879 ignition[850]: INFO : Ignition finished successfully May 10 00:58:51.484826 kernel: kauditd_printk_skb: 24 callbacks suppressed May 10 00:58:51.484852 kernel: audit: type=1130 audit(1746838731.481:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.482595 systemd[1]: Finished ignition-files.service. May 10 00:58:51.483288 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:58:51.486393 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:58:51.486735 systemd[1]: Starting ignition-quench.service... May 10 00:58:51.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.488827 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:58:51.493575 kernel: audit: type=1130 audit(1746838731.487:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.493586 kernel: audit: type=1131 audit(1746838731.487:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.488866 systemd[1]: Finished ignition-quench.service. May 10 00:58:51.494304 initrd-setup-root-after-ignition[876]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:58:51.498115 kernel: audit: type=1130 audit(1746838731.493:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.494608 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:58:51.494787 systemd[1]: Reached target ignition-complete.target. May 10 00:58:51.498493 systemd[1]: Starting initrd-parse-etc.service... May 10 00:58:51.505897 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:58:51.505944 systemd[1]: Finished initrd-parse-etc.service. May 10 00:58:51.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.506332 systemd[1]: Reached target initrd-fs.target. May 10 00:58:51.510964 kernel: audit: type=1130 audit(1746838731.505:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.510977 kernel: audit: type=1131 audit(1746838731.505:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.511032 systemd[1]: Reached target initrd.target. May 10 00:58:51.511256 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:58:51.511765 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:58:51.517803 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:58:51.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.518379 systemd[1]: Starting initrd-cleanup.service... May 10 00:58:51.521128 kernel: audit: type=1130 audit(1746838731.516:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.524784 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:58:51.524958 systemd[1]: Finished initrd-cleanup.service. May 10 00:58:51.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.525543 systemd[1]: Stopped target nss-lookup.target. May 10 00:58:51.529715 kernel: audit: type=1130 audit(1746838731.524:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.529726 kernel: audit: type=1131 audit(1746838731.524:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.529844 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:58:51.530055 systemd[1]: Stopped target timers.target. May 10 00:58:51.530276 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:58:51.530421 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:58:51.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.530680 systemd[1]: Stopped target initrd.target. May 10 00:58:51.532985 systemd[1]: Stopped target basic.target. May 10 00:58:51.533096 kernel: audit: type=1131 audit(1746838731.529:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.533194 systemd[1]: Stopped target ignition-complete.target. May 10 00:58:51.533400 systemd[1]: Stopped target ignition-diskful.target. May 10 00:58:51.533596 systemd[1]: Stopped target initrd-root-device.target. May 10 00:58:51.533797 systemd[1]: Stopped target remote-fs.target. May 10 00:58:51.533985 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:58:51.534188 systemd[1]: Stopped target sysinit.target. May 10 00:58:51.534291 systemd[1]: Stopped target local-fs.target. May 10 00:58:51.534440 systemd[1]: Stopped target local-fs-pre.target. May 10 00:58:51.534589 systemd[1]: Stopped target swap.target. May 10 00:58:51.534740 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:58:51.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.534770 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:58:51.534913 systemd[1]: Stopped target cryptsetup.target. May 10 00:58:51.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.535058 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:58:51.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.535087 systemd[1]: Stopped dracut-initqueue.service. May 10 00:58:51.535237 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:58:51.535257 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:58:51.535374 systemd[1]: Stopped target paths.target. May 10 00:58:51.535514 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:58:51.541140 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:58:51.541284 systemd[1]: Stopped target slices.target. May 10 00:58:51.541502 systemd[1]: Stopped target sockets.target. May 10 00:58:51.541734 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:58:51.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.541764 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:58:51.541958 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:58:51.541986 systemd[1]: Stopped ignition-files.service. May 10 00:58:51.542597 systemd[1]: Stopping ignition-mount.service... May 10 00:58:51.542897 iscsid[741]: iscsid shutting down. May 10 00:58:51.544896 systemd[1]: Stopping iscsid.service... May 10 00:58:51.545384 systemd[1]: Stopping sysroot-boot.service... May 10 00:58:51.545524 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:58:51.545567 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:58:51.545734 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:58:51.545766 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:58:51.546160 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:58:51.546226 systemd[1]: Stopped iscsid.service. May 10 00:58:51.546420 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:58:51.546442 systemd[1]: Closed iscsid.socket. May 10 00:58:51.548172 systemd[1]: Stopping iscsiuio.service... May 10 00:58:51.548396 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:58:51.548460 systemd[1]: Stopped iscsiuio.service. May 10 00:58:51.548621 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:58:51.548640 systemd[1]: Closed iscsiuio.socket. May 10 00:58:51.552124 ignition[889]: INFO : Ignition 2.14.0 May 10 00:58:51.552124 ignition[889]: INFO : Stage: umount May 10 00:58:51.552124 ignition[889]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:58:51.552124 ignition[889]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 10 00:58:51.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.554438 ignition[889]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 10 00:58:51.555067 ignition[889]: INFO : umount: umount passed May 10 00:58:51.555230 ignition[889]: INFO : Ignition finished successfully May 10 00:58:51.556248 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:58:51.556581 systemd[1]: Stopped ignition-mount.service. May 10 00:58:51.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.556836 systemd[1]: Stopped target network.target. May 10 00:58:51.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.559149 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:58:51.559175 systemd[1]: Stopped ignition-disks.service. May 10 00:58:51.559274 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:58:51.559294 systemd[1]: Stopped ignition-kargs.service. May 10 00:58:51.559386 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:58:51.559404 systemd[1]: Stopped ignition-setup.service. May 10 00:58:51.559546 systemd[1]: Stopping systemd-networkd.service... May 10 00:58:51.559740 systemd[1]: Stopping systemd-resolved.service... May 10 00:58:51.560667 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:58:51.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.562638 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:58:51.562685 systemd[1]: Stopped systemd-networkd.service. May 10 00:58:51.563039 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:58:51.563057 systemd[1]: Closed systemd-networkd.socket. May 10 00:58:51.563499 systemd[1]: Stopping network-cleanup.service... May 10 00:58:51.563663 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:58:51.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.563691 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:58:51.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.563957 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. May 10 00:58:51.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.563980 systemd[1]: Stopped afterburn-network-kargs.service. May 10 00:58:51.564141 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:58:51.564162 systemd[1]: Stopped systemd-sysctl.service. May 10 00:58:51.565074 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:58:51.565728 systemd[1]: Stopped systemd-modules-load.service. May 10 00:58:51.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.565888 systemd[1]: Stopping systemd-udevd.service... May 10 00:58:51.568307 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:58:51.568545 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:58:51.568847 systemd[1]: Stopped systemd-resolved.service. May 10 00:58:51.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.568000 audit: BPF prog-id=9 op=UNLOAD May 10 00:58:51.569997 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:58:51.569000 audit: BPF prog-id=6 op=UNLOAD May 10 00:58:51.570368 systemd[1]: Stopped systemd-udevd.service. May 10 00:58:51.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.571480 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:58:51.571652 systemd[1]: Stopped network-cleanup.service. May 10 00:58:51.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.571957 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:58:51.572132 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:58:51.572344 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:58:51.572490 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:58:51.572691 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:58:51.572834 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:58:51.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.573098 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:58:51.573240 systemd[1]: Stopped dracut-cmdline.service. May 10 00:58:51.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.573481 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:58:51.573624 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:58:51.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.574197 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:58:51.574467 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:58:51.574624 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:58:51.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.574983 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:58:51.575221 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:58:51.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.575470 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:58:51.575621 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:58:51.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.576444 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 00:58:51.577278 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:58:51.577465 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:58:51.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.651537 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:58:51.651603 systemd[1]: Stopped sysroot-boot.service. May 10 00:58:51.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.651924 systemd[1]: Reached target initrd-switch-root.target. May 10 00:58:51.652102 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:58:51.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:51.652133 systemd[1]: Stopped initrd-setup-root.service. May 10 00:58:51.652794 systemd[1]: Starting initrd-switch-root.service... May 10 00:58:51.661061 systemd[1]: Switching root. May 10 00:58:51.678778 systemd-journald[216]: Journal stopped May 10 00:58:53.745578 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). May 10 00:58:53.745596 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:58:53.745604 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:58:53.745610 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:58:53.745615 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:58:53.745621 kernel: SELinux: policy capability open_perms=1 May 10 00:58:53.745627 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:58:53.745632 kernel: SELinux: policy capability always_check_network=0 May 10 00:58:53.745638 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:58:53.745643 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:58:53.745648 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:58:53.745653 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:58:53.745661 systemd[1]: Successfully loaded SELinux policy in 36.370ms. May 10 00:58:53.745668 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.972ms. May 10 00:58:53.745676 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:58:53.745682 systemd[1]: Detected virtualization vmware. May 10 00:58:53.745689 systemd[1]: Detected architecture x86-64. May 10 00:58:53.745695 systemd[1]: Detected first boot. May 10 00:58:53.745701 systemd[1]: Initializing machine ID from random generator. May 10 00:58:53.745707 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:58:53.745713 systemd[1]: Populated /etc with preset unit settings. May 10 00:58:53.745720 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:58:53.745726 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:58:53.745733 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:58:53.745740 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:58:53.745747 systemd[1]: Stopped initrd-switch-root.service. May 10 00:58:53.745753 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:58:53.745759 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:58:53.745765 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:58:53.745771 systemd[1]: Created slice system-getty.slice. May 10 00:58:53.745777 systemd[1]: Created slice system-modprobe.slice. May 10 00:58:53.745785 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:58:53.745791 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:58:53.745798 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:58:53.745804 systemd[1]: Created slice user.slice. May 10 00:58:53.745810 systemd[1]: Started systemd-ask-password-console.path. May 10 00:58:53.745816 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:58:53.745822 systemd[1]: Set up automount boot.automount. May 10 00:58:53.745829 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:58:53.745836 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:58:53.745843 systemd[1]: Stopped target initrd-fs.target. May 10 00:58:53.745850 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:58:53.745856 systemd[1]: Reached target integritysetup.target. May 10 00:58:53.745863 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:58:53.745870 systemd[1]: Reached target remote-fs.target. May 10 00:58:53.745876 systemd[1]: Reached target slices.target. May 10 00:58:53.745882 systemd[1]: Reached target swap.target. May 10 00:58:53.745888 systemd[1]: Reached target torcx.target. May 10 00:58:53.745896 systemd[1]: Reached target veritysetup.target. May 10 00:58:53.745902 systemd[1]: Listening on systemd-coredump.socket. May 10 00:58:53.745909 systemd[1]: Listening on systemd-initctl.socket. May 10 00:58:53.745915 systemd[1]: Listening on systemd-networkd.socket. May 10 00:58:53.745921 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:58:53.745928 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:58:53.745936 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:58:53.745943 systemd[1]: Mounting dev-hugepages.mount... May 10 00:58:53.745950 systemd[1]: Mounting dev-mqueue.mount... May 10 00:58:53.745956 systemd[1]: Mounting media.mount... May 10 00:58:53.745963 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:58:53.745969 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:58:53.745976 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:58:53.745984 systemd[1]: Mounting tmp.mount... May 10 00:58:53.745990 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:58:53.745997 systemd[1]: Starting ignition-delete-config.service... May 10 00:58:53.746004 systemd[1]: Starting kmod-static-nodes.service... May 10 00:58:53.746010 systemd[1]: Starting modprobe@configfs.service... May 10 00:58:53.746017 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:58:53.746023 systemd[1]: Starting modprobe@drm.service... May 10 00:58:53.746030 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:58:53.746036 systemd[1]: Starting modprobe@fuse.service... May 10 00:58:53.746043 systemd[1]: Starting modprobe@loop.service... May 10 00:58:53.746050 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:58:53.746057 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:58:53.746064 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:58:53.746070 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:58:53.746084 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:58:53.746094 systemd[1]: Stopped systemd-journald.service. May 10 00:58:53.746101 systemd[1]: Starting systemd-journald.service... May 10 00:58:53.746108 systemd[1]: Starting systemd-modules-load.service... May 10 00:58:53.746116 systemd[1]: Starting systemd-network-generator.service... May 10 00:58:53.746123 systemd[1]: Starting systemd-remount-fs.service... May 10 00:58:53.746130 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:58:53.746136 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:58:53.746143 systemd[1]: Stopped verity-setup.service. May 10 00:58:53.746150 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:58:53.746156 systemd[1]: Mounted dev-hugepages.mount. May 10 00:58:53.746163 systemd[1]: Mounted dev-mqueue.mount. May 10 00:58:53.746169 kernel: fuse: init (API version 7.34) May 10 00:58:53.746176 systemd[1]: Mounted media.mount. May 10 00:58:53.746183 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:58:53.746189 kernel: loop: module loaded May 10 00:58:53.746196 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:58:53.746202 systemd[1]: Mounted tmp.mount. May 10 00:58:53.746209 systemd[1]: Finished kmod-static-nodes.service. May 10 00:58:53.746215 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:58:53.746222 systemd[1]: Finished modprobe@configfs.service. May 10 00:58:53.746230 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:58:53.746237 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:58:53.746244 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:58:53.746250 systemd[1]: Finished modprobe@drm.service. May 10 00:58:53.746257 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:58:53.746263 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:58:53.746270 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:58:53.746280 systemd-journald[1010]: Journal started May 10 00:58:53.746308 systemd-journald[1010]: Runtime Journal (/run/log/journal/723d7b81e88349359fdb23ab4d20f4db) is 4.8M, max 38.8M, 34.0M free. May 10 00:58:51.934000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:58:51.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:58:51.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:58:51.979000 audit: BPF prog-id=10 op=LOAD May 10 00:58:51.979000 audit: BPF prog-id=10 op=UNLOAD May 10 00:58:51.979000 audit: BPF prog-id=11 op=LOAD May 10 00:58:51.979000 audit: BPF prog-id=11 op=UNLOAD May 10 00:58:52.052000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:58:52.052000 audit[922]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:58:52.052000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:58:52.054000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:58:52.054000 audit[922]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:58:52.054000 audit: CWD cwd="/" May 10 00:58:52.054000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:52.054000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:52.054000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:58:53.640000 audit: BPF prog-id=12 op=LOAD May 10 00:58:53.640000 audit: BPF prog-id=3 op=UNLOAD May 10 00:58:53.640000 audit: BPF prog-id=13 op=LOAD May 10 00:58:53.640000 audit: BPF prog-id=14 op=LOAD May 10 00:58:53.640000 audit: BPF prog-id=4 op=UNLOAD May 10 00:58:53.640000 audit: BPF prog-id=5 op=UNLOAD May 10 00:58:53.640000 audit: BPF prog-id=15 op=LOAD May 10 00:58:53.640000 audit: BPF prog-id=12 op=UNLOAD May 10 00:58:53.641000 audit: BPF prog-id=16 op=LOAD May 10 00:58:53.641000 audit: BPF prog-id=17 op=LOAD May 10 00:58:53.641000 audit: BPF prog-id=13 op=UNLOAD May 10 00:58:53.641000 audit: BPF prog-id=14 op=UNLOAD May 10 00:58:53.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.652000 audit: BPF prog-id=15 op=UNLOAD May 10 00:58:53.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.704000 audit: BPF prog-id=18 op=LOAD May 10 00:58:53.704000 audit: BPF prog-id=19 op=LOAD May 10 00:58:53.704000 audit: BPF prog-id=20 op=LOAD May 10 00:58:53.704000 audit: BPF prog-id=16 op=UNLOAD May 10 00:58:53.704000 audit: BPF prog-id=17 op=UNLOAD May 10 00:58:53.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.737000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:58:53.737000 audit[1010]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff5efa7000 a2=4000 a3=7fff5efa709c items=0 ppid=1 pid=1010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:58:53.737000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:58:53.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:52.051592 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:58:53.639601 systemd[1]: Queued start job for default target multi-user.target. May 10 00:58:53.751213 systemd[1]: Finished modprobe@fuse.service. May 10 00:58:53.751227 systemd[1]: Started systemd-journald.service. May 10 00:58:53.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:52.051995 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:58:53.639609 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 10 00:58:52.052007 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:58:53.642376 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:58:52.052026 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:58:53.748855 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:58:52.052032 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:58:53.749038 systemd[1]: Finished modprobe@loop.service. May 10 00:58:52.052051 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:58:52.052059 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:58:52.052198 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:58:52.052221 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:58:53.751819 jq[989]: true May 10 00:58:52.052229 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:58:52.052949 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:58:52.052969 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:58:52.052980 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:58:52.052989 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:58:52.052998 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:58:52.053007 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:58:53.443343 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:53Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:58:53.443517 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:53Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:58:53.443603 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:53Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:58:53.443851 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:53Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:58:53.443886 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:53Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:58:53.752484 jq[1023]: true May 10 00:58:53.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.443931 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-10T00:58:53Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:58:53.752947 systemd[1]: Finished systemd-modules-load.service. May 10 00:58:53.753481 systemd[1]: Finished systemd-network-generator.service. May 10 00:58:53.753683 systemd[1]: Finished systemd-remount-fs.service. May 10 00:58:53.754431 systemd[1]: Reached target network-pre.target. May 10 00:58:53.755397 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:58:53.768519 systemd-journald[1010]: Time spent on flushing to /var/log/journal/723d7b81e88349359fdb23ab4d20f4db is 35.319ms for 1989 entries. May 10 00:58:53.768519 systemd-journald[1010]: System Journal (/var/log/journal/723d7b81e88349359fdb23ab4d20f4db) is 8.0M, max 584.8M, 576.8M free. May 10 00:58:53.809191 systemd-journald[1010]: Received client request to flush runtime journal. May 10 00:58:53.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.756100 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:58:53.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.757652 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:58:53.759389 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:58:53.760193 systemd[1]: Starting systemd-journal-flush.service... May 10 00:58:53.760326 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:58:53.761464 systemd[1]: Starting systemd-random-seed.service... May 10 00:58:53.761576 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:58:53.762418 systemd[1]: Starting systemd-sysctl.service... May 10 00:58:53.765289 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:58:53.766278 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:58:53.772717 systemd[1]: Finished systemd-random-seed.service. May 10 00:58:53.772860 systemd[1]: Reached target first-boot-complete.target. May 10 00:58:53.783683 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:58:53.784611 systemd[1]: Starting systemd-sysusers.service... May 10 00:58:53.787701 systemd[1]: Finished systemd-sysctl.service. May 10 00:58:53.809719 systemd[1]: Finished systemd-journal-flush.service. May 10 00:58:53.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.813219 systemd[1]: Finished systemd-sysusers.service. May 10 00:58:53.814709 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:58:53.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.861827 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:58:53.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:53.870887 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:58:53.871861 systemd[1]: Starting systemd-udev-settle.service... May 10 00:58:53.874190 ignition[1032]: Ignition 2.14.0 May 10 00:58:53.874677 ignition[1032]: deleting config from guestinfo properties May 10 00:58:53.880015 ignition[1032]: Successfully deleted config May 10 00:58:53.881326 udevadm[1055]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 00:58:53.882123 systemd[1]: Finished ignition-delete-config.service. May 10 00:58:53.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.187370 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:58:54.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.187000 audit: BPF prog-id=21 op=LOAD May 10 00:58:54.187000 audit: BPF prog-id=22 op=LOAD May 10 00:58:54.187000 audit: BPF prog-id=7 op=UNLOAD May 10 00:58:54.187000 audit: BPF prog-id=8 op=UNLOAD May 10 00:58:54.188681 systemd[1]: Starting systemd-udevd.service... May 10 00:58:54.203485 systemd-udevd[1056]: Using default interface naming scheme 'v252'. May 10 00:58:54.222803 systemd[1]: Started systemd-udevd.service. May 10 00:58:54.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.222000 audit: BPF prog-id=23 op=LOAD May 10 00:58:54.223873 systemd[1]: Starting systemd-networkd.service... May 10 00:58:54.231000 audit: BPF prog-id=24 op=LOAD May 10 00:58:54.232000 audit: BPF prog-id=25 op=LOAD May 10 00:58:54.232000 audit: BPF prog-id=26 op=LOAD May 10 00:58:54.233498 systemd[1]: Starting systemd-userdbd.service... May 10 00:58:54.250768 systemd[1]: Started systemd-userdbd.service. May 10 00:58:54.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.272833 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:58:54.294114 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:58:54.299135 kernel: ACPI: button: Power Button [PWRF] May 10 00:58:54.299310 systemd-networkd[1061]: lo: Link UP May 10 00:58:54.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.299314 systemd-networkd[1061]: lo: Gained carrier May 10 00:58:54.299564 systemd-networkd[1061]: Enumeration completed May 10 00:58:54.299631 systemd[1]: Started systemd-networkd.service. May 10 00:58:54.299640 systemd-networkd[1061]: ens192: Configuring with /etc/systemd/network/00-vmware.network. May 10 00:58:54.302626 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 10 00:58:54.302728 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 10 00:58:54.303088 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready May 10 00:58:54.303859 systemd-networkd[1061]: ens192: Link UP May 10 00:58:54.304018 systemd-networkd[1061]: ens192: Gained carrier May 10 00:58:54.379000 audit[1060]: AVC avc: denied { confidentiality } for pid=1060 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:58:54.379000 audit[1060]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f3819ab420 a1=338ac a2=7fe785dc6bc5 a3=5 items=110 ppid=1056 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:58:54.379000 audit: CWD cwd="/" May 10 00:58:54.379000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=1 name=(null) inode=25269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=2 name=(null) inode=25269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=3 name=(null) inode=25270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=4 name=(null) inode=25269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=5 name=(null) inode=25271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=6 name=(null) inode=25269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=7 name=(null) inode=25272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=8 name=(null) inode=25272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=9 name=(null) inode=25273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=10 name=(null) inode=25272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=11 name=(null) inode=25274 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=12 name=(null) inode=25272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=13 name=(null) inode=25275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=14 name=(null) inode=25272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=15 name=(null) inode=25276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=16 name=(null) inode=25272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=17 name=(null) inode=25277 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=18 name=(null) inode=25269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=19 name=(null) inode=25278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=20 name=(null) inode=25278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=21 name=(null) inode=25279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=22 name=(null) inode=25278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=23 name=(null) inode=25280 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=24 name=(null) inode=25278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=25 name=(null) inode=25281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=26 name=(null) inode=25278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=27 name=(null) inode=25282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=28 name=(null) inode=25278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=29 name=(null) inode=25283 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=30 name=(null) inode=25269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=31 name=(null) inode=25284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=32 name=(null) inode=25284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=33 name=(null) inode=25285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=34 name=(null) inode=25284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=35 name=(null) inode=25286 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=36 name=(null) inode=25284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=37 name=(null) inode=25287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=38 name=(null) inode=25284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=39 name=(null) inode=25288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=40 name=(null) inode=25284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=41 name=(null) inode=25289 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=42 name=(null) inode=25269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=43 name=(null) inode=25290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=44 name=(null) inode=25290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=45 name=(null) inode=25291 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=46 name=(null) inode=25290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=47 name=(null) inode=25292 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=48 name=(null) inode=25290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=49 name=(null) inode=25293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=50 name=(null) inode=25290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=51 name=(null) inode=25294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=52 name=(null) inode=25290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=53 name=(null) inode=25295 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=55 name=(null) inode=25296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.387126 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 May 10 00:58:54.395870 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc May 10 00:58:54.379000 audit: PATH item=56 name=(null) inode=25296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=57 name=(null) inode=25297 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=58 name=(null) inode=25296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=59 name=(null) inode=25298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=60 name=(null) inode=25296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=61 name=(null) inode=25299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=62 name=(null) inode=25299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=63 name=(null) inode=25300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=64 name=(null) inode=25299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=65 name=(null) inode=25301 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=66 name=(null) inode=25299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=67 name=(null) inode=25302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=68 name=(null) inode=25299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=69 name=(null) inode=25303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=70 name=(null) inode=25299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=71 name=(null) inode=25304 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=72 name=(null) inode=25296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=73 name=(null) inode=25305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=74 name=(null) inode=25305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=75 name=(null) inode=25306 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=76 name=(null) inode=25305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=77 name=(null) inode=25307 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=78 name=(null) inode=25305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=79 name=(null) inode=25308 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=80 name=(null) inode=25305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=81 name=(null) inode=25309 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=82 name=(null) inode=25305 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=83 name=(null) inode=25310 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=84 name=(null) inode=25296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=85 name=(null) inode=25311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=86 name=(null) inode=25311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=87 name=(null) inode=25312 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=88 name=(null) inode=25311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=89 name=(null) inode=25313 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=90 name=(null) inode=25311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=91 name=(null) inode=25314 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=92 name=(null) inode=25311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=93 name=(null) inode=25315 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=94 name=(null) inode=25311 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=95 name=(null) inode=25316 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=96 name=(null) inode=25296 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=97 name=(null) inode=25317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=98 name=(null) inode=25317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=99 name=(null) inode=25318 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=100 name=(null) inode=25317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=101 name=(null) inode=25319 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=102 name=(null) inode=25317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=103 name=(null) inode=25320 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=104 name=(null) inode=25317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=105 name=(null) inode=25321 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=106 name=(null) inode=25317 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=107 name=(null) inode=25322 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PATH item=109 name=(null) inode=25323 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:58:54.379000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:58:54.394981 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:58:54.398881 kernel: Guest personality initialized and is active May 10 00:58:54.398904 kernel: VMCI host device registered (name=vmci, major=10, minor=125) May 10 00:58:54.398915 kernel: Initialized host personality May 10 00:58:54.406096 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! May 10 00:58:54.408392 (udev-worker)[1065]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. May 10 00:58:54.417095 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:58:54.420112 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:58:54.433425 systemd[1]: Finished systemd-udev-settle.service. May 10 00:58:54.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.434553 systemd[1]: Starting lvm2-activation-early.service... May 10 00:58:54.452984 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:58:54.476668 systemd[1]: Finished lvm2-activation-early.service. May 10 00:58:54.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.476872 systemd[1]: Reached target cryptsetup.target. May 10 00:58:54.477865 systemd[1]: Starting lvm2-activation.service... May 10 00:58:54.480924 lvm[1090]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:58:54.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.499745 systemd[1]: Finished lvm2-activation.service. May 10 00:58:54.499929 systemd[1]: Reached target local-fs-pre.target. May 10 00:58:54.500056 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:58:54.500073 systemd[1]: Reached target local-fs.target. May 10 00:58:54.500203 systemd[1]: Reached target machines.target. May 10 00:58:54.501204 systemd[1]: Starting ldconfig.service... May 10 00:58:54.501847 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:58:54.501890 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:58:54.502722 systemd[1]: Starting systemd-boot-update.service... May 10 00:58:54.503572 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:58:54.504579 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:58:54.505697 systemd[1]: Starting systemd-sysext.service... May 10 00:58:54.514974 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:58:54.516213 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1092 (bootctl) May 10 00:58:54.517098 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:58:54.518567 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:58:54.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.531825 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:58:54.531927 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:58:54.551089 kernel: loop0: detected capacity change from 0 to 205544 May 10 00:58:54.783528 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:58:54.784361 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:58:54.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.806104 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:58:54.854324 systemd-fsck[1101]: fsck.fat 4.2 (2021-01-31) May 10 00:58:54.854324 systemd-fsck[1101]: /dev/sda1: 790 files, 120688/258078 clusters May 10 00:58:54.855515 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:58:54.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.856765 systemd[1]: Mounting boot.mount... May 10 00:58:54.866176 kernel: loop1: detected capacity change from 0 to 205544 May 10 00:58:54.872529 systemd[1]: Mounted boot.mount. May 10 00:58:54.882703 systemd[1]: Finished systemd-boot-update.service. May 10 00:58:54.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.895476 (sd-sysext)[1105]: Using extensions 'kubernetes'. May 10 00:58:54.896678 (sd-sysext)[1105]: Merged extensions into '/usr'. May 10 00:58:54.909984 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:58:54.910919 systemd[1]: Mounting usr-share-oem.mount... May 10 00:58:54.911617 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:58:54.913182 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:58:54.914153 systemd[1]: Starting modprobe@loop.service... May 10 00:58:54.914290 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:58:54.914369 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:58:54.914443 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:58:54.916074 systemd[1]: Mounted usr-share-oem.mount. May 10 00:58:54.917357 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:58:54.917429 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:58:54.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.917726 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:58:54.917794 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:58:54.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.918103 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:58:54.918166 systemd[1]: Finished modprobe@loop.service. May 10 00:58:54.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.918490 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:58:54.918550 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:58:54.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:54.919124 systemd[1]: Finished systemd-sysext.service. May 10 00:58:54.919889 systemd[1]: Starting ensure-sysext.service... May 10 00:58:54.920582 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:58:54.924260 systemd[1]: Reloading. May 10 00:58:54.928262 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:58:54.930059 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:58:54.931507 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:58:54.969873 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-05-10T00:58:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:58:54.969890 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-05-10T00:58:54Z" level=info msg="torcx already run" May 10 00:58:55.045214 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:58:55.045224 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:58:55.056458 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:58:55.088000 audit: BPF prog-id=27 op=LOAD May 10 00:58:55.088000 audit: BPF prog-id=24 op=UNLOAD May 10 00:58:55.088000 audit: BPF prog-id=28 op=LOAD May 10 00:58:55.088000 audit: BPF prog-id=29 op=LOAD May 10 00:58:55.088000 audit: BPF prog-id=25 op=UNLOAD May 10 00:58:55.088000 audit: BPF prog-id=26 op=UNLOAD May 10 00:58:55.088000 audit: BPF prog-id=30 op=LOAD May 10 00:58:55.088000 audit: BPF prog-id=31 op=LOAD May 10 00:58:55.088000 audit: BPF prog-id=21 op=UNLOAD May 10 00:58:55.088000 audit: BPF prog-id=22 op=UNLOAD May 10 00:58:55.089000 audit: BPF prog-id=32 op=LOAD May 10 00:58:55.089000 audit: BPF prog-id=23 op=UNLOAD May 10 00:58:55.090000 audit: BPF prog-id=33 op=LOAD May 10 00:58:55.090000 audit: BPF prog-id=18 op=UNLOAD May 10 00:58:55.090000 audit: BPF prog-id=34 op=LOAD May 10 00:58:55.090000 audit: BPF prog-id=35 op=LOAD May 10 00:58:55.090000 audit: BPF prog-id=19 op=UNLOAD May 10 00:58:55.090000 audit: BPF prog-id=20 op=UNLOAD May 10 00:58:55.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.095388 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:58:55.097141 systemd[1]: Starting audit-rules.service... May 10 00:58:55.097879 systemd[1]: Starting clean-ca-certificates.service... May 10 00:58:55.098748 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:58:55.099000 audit: BPF prog-id=36 op=LOAD May 10 00:58:55.102613 systemd[1]: Starting systemd-resolved.service... May 10 00:58:55.102000 audit: BPF prog-id=37 op=LOAD May 10 00:58:55.103686 systemd[1]: Starting systemd-timesyncd.service... May 10 00:58:55.104437 systemd[1]: Starting systemd-update-utmp.service... May 10 00:58:55.104830 systemd[1]: Finished clean-ca-certificates.service. May 10 00:58:55.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.105038 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:58:55.111463 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:58:55.112154 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:58:55.112829 systemd[1]: Starting modprobe@loop.service... May 10 00:58:55.112952 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:58:55.113021 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:58:55.113350 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:58:55.114868 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:58:55.114927 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:58:55.114986 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:58:55.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.115503 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:58:55.115582 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:58:55.117177 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:58:55.117245 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:58:55.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.118122 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:58:55.119000 audit[1197]: SYSTEM_BOOT pid=1197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:58:55.119759 systemd[1]: Starting modprobe@drm.service... May 10 00:58:55.119905 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:58:55.119973 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:58:55.120787 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:58:55.120912 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:58:55.120991 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:58:55.121447 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:58:55.121534 systemd[1]: Finished modprobe@loop.service. May 10 00:58:55.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.122327 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:58:55.122392 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:58:55.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.124237 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:58:55.124931 systemd[1]: Finished ensure-sysext.service. May 10 00:58:55.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.127171 systemd[1]: Finished systemd-update-utmp.service. May 10 00:58:55.127389 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:58:55.127459 systemd[1]: Finished modprobe@drm.service. May 10 00:58:55.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.134974 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:58:55.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.141785 ldconfig[1091]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:58:55.144290 systemd[1]: Finished ldconfig.service. May 10 00:58:55.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.145222 systemd[1]: Starting systemd-update-done.service... May 10 00:58:55.148862 systemd[1]: Finished systemd-update-done.service. May 10 00:58:55.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.162936 systemd[1]: Started systemd-timesyncd.service. May 10 00:58:55.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:58:55.163093 systemd[1]: Reached target time-set.target. May 10 00:58:55.165000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:58:55.165000 audit[1219]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4c308790 a2=420 a3=0 items=0 ppid=1192 pid=1219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:58:55.166275 augenrules[1219]: No rules May 10 00:58:55.165000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:58:55.166616 systemd[1]: Finished audit-rules.service. May 10 00:58:55.173502 systemd-resolved[1195]: Positive Trust Anchors: May 10 00:58:55.173511 systemd-resolved[1195]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:58:55.173530 systemd-resolved[1195]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:58:55.192495 systemd-resolved[1195]: Defaulting to hostname 'linux'. May 10 00:58:55.193538 systemd[1]: Started systemd-resolved.service. May 10 00:58:55.193687 systemd[1]: Reached target network.target. May 10 00:58:55.193794 systemd[1]: Reached target nss-lookup.target. May 10 00:58:55.193907 systemd[1]: Reached target sysinit.target. May 10 00:58:55.194068 systemd[1]: Started motdgen.path. May 10 00:58:55.194229 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:58:55.194451 systemd[1]: Started logrotate.timer. May 10 00:58:55.194596 systemd[1]: Started mdadm.timer. May 10 00:58:55.194693 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:58:55.194806 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:58:55.194830 systemd[1]: Reached target paths.target. May 10 00:58:55.194929 systemd[1]: Reached target timers.target. May 10 00:58:55.195195 systemd[1]: Listening on dbus.socket. May 10 00:58:55.196073 systemd[1]: Starting docker.socket... May 10 00:58:55.198063 systemd[1]: Listening on sshd.socket. May 10 00:58:55.198300 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:58:55.198575 systemd[1]: Listening on docker.socket. May 10 00:58:55.198725 systemd[1]: Reached target sockets.target. May 10 00:58:55.198831 systemd[1]: Reached target basic.target. May 10 00:58:55.198957 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:58:55.198978 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:58:55.199673 systemd[1]: Starting containerd.service... May 10 00:58:55.200574 systemd[1]: Starting dbus.service... May 10 00:58:55.201836 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:58:55.203259 systemd[1]: Starting extend-filesystems.service... May 10 00:58:55.203912 jq[1229]: false May 10 00:58:55.203946 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:58:55.205292 systemd[1]: Starting motdgen.service... May 10 00:58:55.206387 systemd[1]: Starting prepare-helm.service... May 10 00:58:55.207416 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:58:55.208510 systemd[1]: Starting sshd-keygen.service... May 10 00:58:55.212890 systemd[1]: Starting systemd-logind.service... May 10 00:58:55.213002 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:58:55.213037 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:58:55.213441 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:58:55.213763 systemd[1]: Starting update-engine.service... May 10 00:58:55.214587 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:58:55.215898 systemd[1]: Starting vmtoolsd.service... May 10 00:58:55.217210 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:58:55.217450 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:58:55.222313 jq[1244]: true May 10 00:58:55.222902 systemd[1]: Started vmtoolsd.service. May 10 00:58:55.231141 extend-filesystems[1230]: Found loop1 May 10 00:58:55.231804 extend-filesystems[1230]: Found sda May 10 00:58:55.232255 extend-filesystems[1230]: Found sda1 May 10 00:58:55.232289 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:58:55.232383 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:58:55.232466 extend-filesystems[1230]: Found sda2 May 10 00:58:55.232607 extend-filesystems[1230]: Found sda3 May 10 00:58:55.232889 extend-filesystems[1230]: Found usr May 10 00:58:55.232889 extend-filesystems[1230]: Found sda4 May 10 00:58:55.232889 extend-filesystems[1230]: Found sda6 May 10 00:58:55.232889 extend-filesystems[1230]: Found sda7 May 10 00:58:55.232889 extend-filesystems[1230]: Found sda9 May 10 00:58:55.232889 extend-filesystems[1230]: Checking size of /dev/sda9 May 10 00:58:55.234560 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:58:55.234650 systemd[1]: Finished motdgen.service. May 10 00:58:55.235895 tar[1247]: linux-amd64/helm May 10 00:58:55.238085 jq[1249]: true May 10 00:58:55.274696 extend-filesystems[1230]: Old size kept for /dev/sda9 May 10 00:58:55.274696 extend-filesystems[1230]: Found sr0 May 10 00:58:55.275588 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:58:55.275695 systemd[1]: Finished extend-filesystems.service. May 10 00:58:55.302182 env[1248]: time="2025-05-10T00:58:55.302135139Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 01:00:15.723014 systemd-resolved[1195]: Clock change detected. Flushing caches. May 10 01:00:15.723078 systemd-timesyncd[1196]: Contacted time server 168.235.89.132:123 (0.flatcar.pool.ntp.org). May 10 01:00:15.723109 systemd-timesyncd[1196]: Initial clock synchronization to Sat 2025-05-10 01:00:15.722985 UTC. May 10 01:00:15.723525 dbus-daemon[1228]: [system] SELinux support is enabled May 10 01:00:15.723593 systemd[1]: Started dbus.service. May 10 01:00:15.724733 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 01:00:15.724750 systemd[1]: Reached target system-config.target. May 10 01:00:15.724863 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 01:00:15.724872 systemd[1]: Reached target user-config.target. May 10 01:00:15.727199 update_engine[1243]: I0510 01:00:15.726543 1243 main.cc:92] Flatcar Update Engine starting May 10 01:00:15.728692 systemd[1]: Started update-engine.service. May 10 01:00:15.728832 update_engine[1243]: I0510 01:00:15.728737 1243 update_check_scheduler.cc:74] Next update check in 9m32s May 10 01:00:15.729851 systemd[1]: Started locksmithd.service. May 10 01:00:15.738068 bash[1278]: Updated "/home/core/.ssh/authorized_keys" May 10 01:00:15.738496 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 01:00:15.745299 kernel: NET: Registered PF_VSOCK protocol family May 10 01:00:15.755963 systemd-logind[1241]: Watching system buttons on /dev/input/event1 (Power Button) May 10 01:00:15.755976 systemd-logind[1241]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 01:00:15.757658 systemd-logind[1241]: New seat seat0. May 10 01:00:15.762935 systemd[1]: Started systemd-logind.service. May 10 01:00:15.792270 env[1248]: time="2025-05-10T01:00:15.792244639Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 01:00:15.792361 env[1248]: time="2025-05-10T01:00:15.792336328Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.793734897Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.793750442Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.793859709Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.793872388Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.793880047Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.793885349Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.793925224Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.794052734Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.794113963Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 01:00:15.795299 env[1248]: time="2025-05-10T01:00:15.794123806Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 01:00:15.795514 env[1248]: time="2025-05-10T01:00:15.794149056Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 01:00:15.795514 env[1248]: time="2025-05-10T01:00:15.794156286Z" level=info msg="metadata content store policy set" policy=shared May 10 01:00:15.798473 env[1248]: time="2025-05-10T01:00:15.798457051Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 01:00:15.798513 env[1248]: time="2025-05-10T01:00:15.798474563Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 01:00:15.798513 env[1248]: time="2025-05-10T01:00:15.798485512Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 01:00:15.798513 env[1248]: time="2025-05-10T01:00:15.798502655Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798513 env[1248]: time="2025-05-10T01:00:15.798510842Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798601 env[1248]: time="2025-05-10T01:00:15.798518357Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798601 env[1248]: time="2025-05-10T01:00:15.798525238Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798601 env[1248]: time="2025-05-10T01:00:15.798533096Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798601 env[1248]: time="2025-05-10T01:00:15.798539908Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798601 env[1248]: time="2025-05-10T01:00:15.798546887Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798601 env[1248]: time="2025-05-10T01:00:15.798553541Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798601 env[1248]: time="2025-05-10T01:00:15.798559823Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 01:00:15.798729 env[1248]: time="2025-05-10T01:00:15.798608000Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 01:00:15.798729 env[1248]: time="2025-05-10T01:00:15.798652094Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 01:00:15.798796 env[1248]: time="2025-05-10T01:00:15.798775987Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 01:00:15.798796 env[1248]: time="2025-05-10T01:00:15.798791773Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798849 env[1248]: time="2025-05-10T01:00:15.798799453Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 01:00:15.798849 env[1248]: time="2025-05-10T01:00:15.798828249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798849 env[1248]: time="2025-05-10T01:00:15.798836001Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798849 env[1248]: time="2025-05-10T01:00:15.798842612Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798849 env[1248]: time="2025-05-10T01:00:15.798848487Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798948 env[1248]: time="2025-05-10T01:00:15.798855001Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798948 env[1248]: time="2025-05-10T01:00:15.798861351Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798948 env[1248]: time="2025-05-10T01:00:15.798867506Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798948 env[1248]: time="2025-05-10T01:00:15.798873432Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 01:00:15.798948 env[1248]: time="2025-05-10T01:00:15.798881263Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 01:00:15.798948 env[1248]: time="2025-05-10T01:00:15.798942500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 01:00:15.799056 env[1248]: time="2025-05-10T01:00:15.798951494Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 01:00:15.799056 env[1248]: time="2025-05-10T01:00:15.798957819Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 01:00:15.799056 env[1248]: time="2025-05-10T01:00:15.798963748Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 01:00:15.799056 env[1248]: time="2025-05-10T01:00:15.798971481Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 01:00:15.799056 env[1248]: time="2025-05-10T01:00:15.798977234Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 01:00:15.799056 env[1248]: time="2025-05-10T01:00:15.798987180Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 01:00:15.799056 env[1248]: time="2025-05-10T01:00:15.799019526Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 01:00:15.799193 env[1248]: time="2025-05-10T01:00:15.799128822Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 01:00:15.799193 env[1248]: time="2025-05-10T01:00:15.799159826Z" level=info msg="Connect containerd service" May 10 01:00:15.799193 env[1248]: time="2025-05-10T01:00:15.799180549Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.799658132Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.800044621Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.800066944Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.800545804Z" level=info msg="containerd successfully booted in 0.080499s" May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.801434951Z" level=info msg="Start subscribing containerd event" May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.801470706Z" level=info msg="Start recovering state" May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.801512360Z" level=info msg="Start event monitor" May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.801525892Z" level=info msg="Start snapshots syncer" May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.801535835Z" level=info msg="Start cni network conf syncer for default" May 10 01:00:15.801798 env[1248]: time="2025-05-10T01:00:15.801546005Z" level=info msg="Start streaming server" May 10 01:00:15.800136 systemd[1]: Started containerd.service. May 10 01:00:15.947345 sshd_keygen[1251]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 01:00:15.960702 systemd[1]: Finished sshd-keygen.service. May 10 01:00:15.961824 systemd[1]: Starting issuegen.service... May 10 01:00:15.965124 systemd[1]: issuegen.service: Deactivated successfully. May 10 01:00:15.965200 systemd[1]: Finished issuegen.service. May 10 01:00:15.966124 systemd[1]: Starting systemd-user-sessions.service... May 10 01:00:15.969921 systemd[1]: Finished systemd-user-sessions.service. May 10 01:00:15.970736 systemd[1]: Started getty@tty1.service. May 10 01:00:15.971503 systemd[1]: Started serial-getty@ttyS0.service. May 10 01:00:15.971683 systemd[1]: Reached target getty.target. May 10 01:00:16.027130 locksmithd[1287]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 01:00:16.069103 tar[1247]: linux-amd64/LICENSE May 10 01:00:16.069194 tar[1247]: linux-amd64/README.md May 10 01:00:16.071830 systemd[1]: Finished prepare-helm.service. May 10 01:00:16.142712 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 01:00:16.142772 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 01:00:16.425513 systemd-networkd[1061]: ens192: Gained IPv6LL May 10 01:00:16.426740 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 01:00:16.427107 systemd[1]: Reached target network-online.target. May 10 01:00:16.429047 systemd[1]: Starting kubelet.service... May 10 01:00:17.264506 systemd[1]: Started kubelet.service. May 10 01:00:17.264876 systemd[1]: Reached target multi-user.target. May 10 01:00:17.265916 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 01:00:17.271473 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 01:00:17.271574 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 01:00:17.271754 systemd[1]: Startup finished in 835ms (kernel) + 5.331s (initrd) + 4.981s (userspace) = 11.149s. May 10 01:00:17.300355 login[1349]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 10 01:00:17.300516 login[1348]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 10 01:00:17.309659 systemd[1]: Created slice user-500.slice. May 10 01:00:17.310461 systemd[1]: Starting user-runtime-dir@500.service... May 10 01:00:17.314799 systemd-logind[1241]: New session 2 of user core. May 10 01:00:17.316903 systemd-logind[1241]: New session 1 of user core. May 10 01:00:17.318950 systemd[1]: Finished user-runtime-dir@500.service. May 10 01:00:17.319899 systemd[1]: Starting user@500.service... May 10 01:00:17.322544 (systemd)[1362]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 01:00:17.399960 systemd[1362]: Queued start job for default target default.target. May 10 01:00:17.400297 systemd[1362]: Reached target paths.target. May 10 01:00:17.400310 systemd[1362]: Reached target sockets.target. May 10 01:00:17.400320 systemd[1362]: Reached target timers.target. May 10 01:00:17.400328 systemd[1362]: Reached target basic.target. May 10 01:00:17.400361 systemd[1362]: Reached target default.target. May 10 01:00:17.400377 systemd[1362]: Startup finished in 74ms. May 10 01:00:17.400746 systemd[1]: Started user@500.service. May 10 01:00:17.401619 systemd[1]: Started session-1.scope. May 10 01:00:17.402149 systemd[1]: Started session-2.scope. May 10 01:00:17.862603 kubelet[1359]: E0510 01:00:17.862575 1359 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:00:17.864008 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:00:17.864110 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:00:28.022535 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 01:00:28.022688 systemd[1]: Stopped kubelet.service. May 10 01:00:28.023847 systemd[1]: Starting kubelet.service... May 10 01:00:28.246818 systemd[1]: Started kubelet.service. May 10 01:00:28.278891 kubelet[1390]: E0510 01:00:28.278822 1390 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:00:28.280844 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:00:28.280916 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:00:38.522666 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 01:00:38.522823 systemd[1]: Stopped kubelet.service. May 10 01:00:38.524035 systemd[1]: Starting kubelet.service... May 10 01:00:38.722199 systemd[1]: Started kubelet.service. May 10 01:00:38.759110 kubelet[1400]: E0510 01:00:38.759082 1400 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:00:38.760484 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:00:38.760576 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:00:45.809623 systemd[1]: Created slice system-sshd.slice. May 10 01:00:45.810602 systemd[1]: Started sshd@0-139.178.70.100:22-139.178.89.65:43278.service. May 10 01:00:45.862945 sshd[1406]: Accepted publickey for core from 139.178.89.65 port 43278 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:00:45.864029 sshd[1406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:00:45.867566 systemd[1]: Started session-3.scope. May 10 01:00:45.867933 systemd-logind[1241]: New session 3 of user core. May 10 01:00:45.916110 systemd[1]: Started sshd@1-139.178.70.100:22-139.178.89.65:43288.service. May 10 01:00:45.955366 sshd[1411]: Accepted publickey for core from 139.178.89.65 port 43288 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:00:45.956260 sshd[1411]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:00:45.959185 systemd[1]: Started session-4.scope. May 10 01:00:45.959498 systemd-logind[1241]: New session 4 of user core. May 10 01:00:46.010406 sshd[1411]: pam_unix(sshd:session): session closed for user core May 10 01:00:46.011603 systemd[1]: Started sshd@2-139.178.70.100:22-139.178.89.65:43294.service. May 10 01:00:46.015596 systemd-logind[1241]: Session 4 logged out. Waiting for processes to exit. May 10 01:00:46.016573 systemd[1]: sshd@1-139.178.70.100:22-139.178.89.65:43288.service: Deactivated successfully. May 10 01:00:46.017028 systemd[1]: session-4.scope: Deactivated successfully. May 10 01:00:46.018058 systemd-logind[1241]: Removed session 4. May 10 01:00:46.051718 sshd[1416]: Accepted publickey for core from 139.178.89.65 port 43294 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:00:46.052727 sshd[1416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:00:46.056039 systemd[1]: Started session-5.scope. May 10 01:00:46.057092 systemd-logind[1241]: New session 5 of user core. May 10 01:00:46.105468 sshd[1416]: pam_unix(sshd:session): session closed for user core May 10 01:00:46.108026 systemd[1]: sshd@2-139.178.70.100:22-139.178.89.65:43294.service: Deactivated successfully. May 10 01:00:46.108460 systemd[1]: session-5.scope: Deactivated successfully. May 10 01:00:46.108913 systemd-logind[1241]: Session 5 logged out. Waiting for processes to exit. May 10 01:00:46.109616 systemd[1]: Started sshd@3-139.178.70.100:22-139.178.89.65:43296.service. May 10 01:00:46.110275 systemd-logind[1241]: Removed session 5. May 10 01:00:46.152500 sshd[1423]: Accepted publickey for core from 139.178.89.65 port 43296 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:00:46.153353 sshd[1423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:00:46.156321 systemd-logind[1241]: New session 6 of user core. May 10 01:00:46.156902 systemd[1]: Started session-6.scope. May 10 01:00:46.208481 sshd[1423]: pam_unix(sshd:session): session closed for user core May 10 01:00:46.210876 systemd[1]: sshd@3-139.178.70.100:22-139.178.89.65:43296.service: Deactivated successfully. May 10 01:00:46.211312 systemd[1]: session-6.scope: Deactivated successfully. May 10 01:00:46.211865 systemd-logind[1241]: Session 6 logged out. Waiting for processes to exit. May 10 01:00:46.212627 systemd[1]: Started sshd@4-139.178.70.100:22-139.178.89.65:43300.service. May 10 01:00:46.213548 systemd-logind[1241]: Removed session 6. May 10 01:00:46.253154 sshd[1429]: Accepted publickey for core from 139.178.89.65 port 43300 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:00:46.254032 sshd[1429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:00:46.257049 systemd-logind[1241]: New session 7 of user core. May 10 01:00:46.257535 systemd[1]: Started session-7.scope. May 10 01:00:46.317865 sudo[1432]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 01:00:46.318039 sudo[1432]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 01:00:46.326556 dbus-daemon[1228]: \xd0\xdd\xdc\u001b\xbdU: received setenforce notice (enforcing=-1165400816) May 10 01:00:46.326669 sudo[1432]: pam_unix(sudo:session): session closed for user root May 10 01:00:46.328967 sshd[1429]: pam_unix(sshd:session): session closed for user core May 10 01:00:46.331328 systemd[1]: Started sshd@5-139.178.70.100:22-139.178.89.65:43310.service. May 10 01:00:46.332179 systemd[1]: sshd@4-139.178.70.100:22-139.178.89.65:43300.service: Deactivated successfully. May 10 01:00:46.332705 systemd[1]: session-7.scope: Deactivated successfully. May 10 01:00:46.333378 systemd-logind[1241]: Session 7 logged out. Waiting for processes to exit. May 10 01:00:46.334489 systemd-logind[1241]: Removed session 7. May 10 01:00:46.370652 sshd[1435]: Accepted publickey for core from 139.178.89.65 port 43310 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:00:46.371758 sshd[1435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:00:46.375124 systemd[1]: Started session-8.scope. May 10 01:00:46.375596 systemd-logind[1241]: New session 8 of user core. May 10 01:00:46.426577 sudo[1440]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 01:00:46.426979 sudo[1440]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 01:00:46.429111 sudo[1440]: pam_unix(sudo:session): session closed for user root May 10 01:00:46.432461 sudo[1439]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 01:00:46.432643 sudo[1439]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 01:00:46.439255 systemd[1]: Stopping audit-rules.service... May 10 01:00:46.439000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 01:00:46.441378 kernel: kauditd_printk_skb: 285 callbacks suppressed May 10 01:00:46.441409 kernel: audit: type=1305 audit(1746838846.439:206): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 01:00:46.439000 audit[1443]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde220ae30 a2=420 a3=0 items=0 ppid=1 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.443727 auditctl[1443]: No rules May 10 01:00:46.444008 systemd[1]: audit-rules.service: Deactivated successfully. May 10 01:00:46.448215 kernel: audit: type=1300 audit(1746838846.439:206): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde220ae30 a2=420 a3=0 items=0 ppid=1 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.444122 systemd[1]: Stopped audit-rules.service. May 10 01:00:46.445260 systemd[1]: Starting audit-rules.service... May 10 01:00:46.439000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 01:00:46.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:46.454105 kernel: audit: type=1327 audit(1746838846.439:206): proctitle=2F7362696E2F617564697463746C002D44 May 10 01:00:46.454141 kernel: audit: type=1131 audit(1746838846.442:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:46.459557 augenrules[1460]: No rules May 10 01:00:46.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:46.460479 sudo[1439]: pam_unix(sudo:session): session closed for user root May 10 01:00:46.459947 systemd[1]: Finished audit-rules.service. May 10 01:00:46.458000 audit[1439]: USER_END pid=1439 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:00:46.465445 kernel: audit: type=1130 audit(1746838846.458:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:46.465472 kernel: audit: type=1106 audit(1746838846.458:209): pid=1439 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:00:46.465488 kernel: audit: type=1104 audit(1746838846.458:210): pid=1439 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:00:46.458000 audit[1439]: CRED_DISP pid=1439 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:00:46.468384 sshd[1435]: pam_unix(sshd:session): session closed for user core May 10 01:00:46.470366 systemd[1]: Started sshd@6-139.178.70.100:22-139.178.89.65:43322.service. May 10 01:00:46.470619 systemd[1]: sshd@5-139.178.70.100:22-139.178.89.65:43310.service: Deactivated successfully. May 10 01:00:46.470963 systemd[1]: session-8.scope: Deactivated successfully. May 10 01:00:46.468000 audit[1435]: USER_END pid=1435 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:00:46.477571 kernel: audit: type=1106 audit(1746838846.468:211): pid=1435 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:00:46.477607 kernel: audit: type=1104 audit(1746838846.468:212): pid=1435 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:00:46.468000 audit[1435]: CRED_DISP pid=1435 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:00:46.477675 systemd-logind[1241]: Session 8 logged out. Waiting for processes to exit. May 10 01:00:46.480781 kernel: audit: type=1130 audit(1746838846.469:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-139.178.89.65:43322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:46.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-139.178.89.65:43322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:46.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.100:22-139.178.89.65:43310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:46.480977 systemd-logind[1241]: Removed session 8. May 10 01:00:46.509237 sshd[1465]: Accepted publickey for core from 139.178.89.65 port 43322 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:00:46.507000 audit[1465]: USER_ACCT pid=1465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:00:46.508000 audit[1465]: CRED_ACQ pid=1465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:00:46.508000 audit[1465]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe24159490 a2=3 a3=0 items=0 ppid=1 pid=1465 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.508000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:00:46.510340 sshd[1465]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:00:46.514093 systemd[1]: Started session-9.scope. May 10 01:00:46.514962 systemd-logind[1241]: New session 9 of user core. May 10 01:00:46.517000 audit[1465]: USER_START pid=1465 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:00:46.518000 audit[1468]: CRED_ACQ pid=1468 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:00:46.564000 audit[1469]: USER_ACCT pid=1469 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:00:46.565518 sudo[1469]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 01:00:46.565692 sudo[1469]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 01:00:46.564000 audit[1469]: CRED_REFR pid=1469 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:00:46.565000 audit[1469]: USER_START pid=1469 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:00:46.582816 systemd[1]: Starting docker.service... May 10 01:00:46.606651 env[1479]: time="2025-05-10T01:00:46.606620579Z" level=info msg="Starting up" May 10 01:00:46.607403 env[1479]: time="2025-05-10T01:00:46.607388273Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 01:00:46.607403 env[1479]: time="2025-05-10T01:00:46.607399853Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 01:00:46.607469 env[1479]: time="2025-05-10T01:00:46.607412438Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 01:00:46.607469 env[1479]: time="2025-05-10T01:00:46.607418711Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 01:00:46.608506 env[1479]: time="2025-05-10T01:00:46.608365434Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 01:00:46.608506 env[1479]: time="2025-05-10T01:00:46.608375320Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 01:00:46.608506 env[1479]: time="2025-05-10T01:00:46.608382467Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 01:00:46.608506 env[1479]: time="2025-05-10T01:00:46.608387880Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 01:00:46.611268 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1776656928-merged.mount: Deactivated successfully. May 10 01:00:46.628036 env[1479]: time="2025-05-10T01:00:46.627985458Z" level=info msg="Loading containers: start." May 10 01:00:46.662000 audit[1510]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1510 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.662000 audit[1510]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe6bde4190 a2=0 a3=7ffe6bde417c items=0 ppid=1479 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.662000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 01:00:46.663000 audit[1512]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1512 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.663000 audit[1512]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff83f47270 a2=0 a3=7fff83f4725c items=0 ppid=1479 pid=1512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 01:00:46.665000 audit[1514]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1514 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.665000 audit[1514]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe81b08ab0 a2=0 a3=7ffe81b08a9c items=0 ppid=1479 pid=1514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.665000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 01:00:46.665000 audit[1516]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.665000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd53a7e970 a2=0 a3=7ffd53a7e95c items=0 ppid=1479 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.665000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 01:00:46.667000 audit[1518]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.667000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed19c09a0 a2=0 a3=7ffed19c098c items=0 ppid=1479 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 01:00:46.681000 audit[1523]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1523 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.681000 audit[1523]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd027d8700 a2=0 a3=7ffd027d86ec items=0 ppid=1479 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.681000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 01:00:46.684000 audit[1525]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1525 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.684000 audit[1525]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeda3f8210 a2=0 a3=7ffeda3f81fc items=0 ppid=1479 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.684000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 01:00:46.686000 audit[1527]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.686000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff6cb2dc40 a2=0 a3=7fff6cb2dc2c items=0 ppid=1479 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 01:00:46.687000 audit[1529]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.687000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffeba530e10 a2=0 a3=7ffeba530dfc items=0 ppid=1479 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 01:00:46.691000 audit[1533]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.691000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffbfc0bc40 a2=0 a3=7fffbfc0bc2c items=0 ppid=1479 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 01:00:46.697000 audit[1534]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1534 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.697000 audit[1534]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffce7277100 a2=0 a3=7ffce72770ec items=0 ppid=1479 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.697000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 01:00:46.705298 kernel: Initializing XFRM netlink socket May 10 01:00:46.726110 env[1479]: time="2025-05-10T01:00:46.726089938Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 01:00:46.737000 audit[1542]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.737000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffceddc24b0 a2=0 a3=7ffceddc249c items=0 ppid=1479 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 01:00:46.745000 audit[1545]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.745000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcca6cd7c0 a2=0 a3=7ffcca6cd7ac items=0 ppid=1479 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.745000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 01:00:46.746000 audit[1548]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.746000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffef2070c20 a2=0 a3=7ffef2070c0c items=0 ppid=1479 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 01:00:46.748000 audit[1550]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.748000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc83f5ee20 a2=0 a3=7ffc83f5ee0c items=0 ppid=1479 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 01:00:46.749000 audit[1552]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.749000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdc55a23b0 a2=0 a3=7ffdc55a239c items=0 ppid=1479 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 01:00:46.750000 audit[1554]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.750000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffeb5d89c60 a2=0 a3=7ffeb5d89c4c items=0 ppid=1479 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 01:00:46.751000 audit[1556]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.751000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc1b6c2860 a2=0 a3=7ffc1b6c284c items=0 ppid=1479 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 01:00:46.756000 audit[1559]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.756000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe8c8cb410 a2=0 a3=7ffe8c8cb3fc items=0 ppid=1479 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 01:00:46.757000 audit[1561]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.757000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd56984a90 a2=0 a3=7ffd56984a7c items=0 ppid=1479 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 01:00:46.758000 audit[1563]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.758000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc41aef1a0 a2=0 a3=7ffc41aef18c items=0 ppid=1479 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 01:00:46.759000 audit[1565]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.759000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff9ff687d0 a2=0 a3=7fff9ff687bc items=0 ppid=1479 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 01:00:46.761257 systemd-networkd[1061]: docker0: Link UP May 10 01:00:46.763000 audit[1569]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.763000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe905357d0 a2=0 a3=7ffe905357bc items=0 ppid=1479 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 01:00:46.767000 audit[1570]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:00:46.767000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffd2324f10 a2=0 a3=7fffd2324efc items=0 ppid=1479 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:00:46.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 01:00:46.769343 env[1479]: time="2025-05-10T01:00:46.769326738Z" level=info msg="Loading containers: done." May 10 01:00:46.776908 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2265205165-merged.mount: Deactivated successfully. May 10 01:00:46.781649 env[1479]: time="2025-05-10T01:00:46.781628442Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 01:00:46.781739 env[1479]: time="2025-05-10T01:00:46.781725916Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 01:00:46.781787 env[1479]: time="2025-05-10T01:00:46.781776553Z" level=info msg="Daemon has completed initialization" May 10 01:00:46.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:46.787903 systemd[1]: Started docker.service. May 10 01:00:46.792461 env[1479]: time="2025-05-10T01:00:46.792432170Z" level=info msg="API listen on /run/docker.sock" May 10 01:00:47.915921 env[1248]: time="2025-05-10T01:00:47.915732747Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 10 01:00:48.479007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1277027418.mount: Deactivated successfully. May 10 01:00:48.772496 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 10 01:00:48.772667 systemd[1]: Stopped kubelet.service. May 10 01:00:48.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:48.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:48.773948 systemd[1]: Starting kubelet.service... May 10 01:00:48.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:48.827277 systemd[1]: Started kubelet.service. May 10 01:00:48.871153 kubelet[1607]: E0510 01:00:48.871074 1607 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:00:48.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:00:48.872104 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:00:48.872177 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:00:49.841935 env[1248]: time="2025-05-10T01:00:49.841905283Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:49.842687 env[1248]: time="2025-05-10T01:00:49.842670560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:49.843741 env[1248]: time="2025-05-10T01:00:49.843728933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:49.844690 env[1248]: time="2025-05-10T01:00:49.844675414Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:49.845240 env[1248]: time="2025-05-10T01:00:49.845224504Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 10 01:00:49.846552 env[1248]: time="2025-05-10T01:00:49.846525891Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 10 01:00:51.461194 env[1248]: time="2025-05-10T01:00:51.461165928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:51.473054 env[1248]: time="2025-05-10T01:00:51.473033704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:51.478982 env[1248]: time="2025-05-10T01:00:51.478964620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:51.486267 env[1248]: time="2025-05-10T01:00:51.486249645Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:51.486798 env[1248]: time="2025-05-10T01:00:51.486774278Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 10 01:00:51.487248 env[1248]: time="2025-05-10T01:00:51.487233502Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 10 01:00:52.992256 env[1248]: time="2025-05-10T01:00:52.992230923Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:52.993465 env[1248]: time="2025-05-10T01:00:52.993453372Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:52.994670 env[1248]: time="2025-05-10T01:00:52.994658818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:52.995838 env[1248]: time="2025-05-10T01:00:52.995826602Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:52.996337 env[1248]: time="2025-05-10T01:00:52.996324641Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 10 01:00:52.997822 env[1248]: time="2025-05-10T01:00:52.997809302Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 10 01:00:54.194012 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3967409456.mount: Deactivated successfully. May 10 01:00:54.689371 env[1248]: time="2025-05-10T01:00:54.689341272Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:54.699556 env[1248]: time="2025-05-10T01:00:54.699538533Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:54.704646 env[1248]: time="2025-05-10T01:00:54.704629016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:54.711930 env[1248]: time="2025-05-10T01:00:54.711912758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:54.712197 env[1248]: time="2025-05-10T01:00:54.712178089Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 10 01:00:54.713051 env[1248]: time="2025-05-10T01:00:54.713036260Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 01:00:55.214273 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3533607160.mount: Deactivated successfully. May 10 01:00:55.943771 env[1248]: time="2025-05-10T01:00:55.943719880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:55.944500 env[1248]: time="2025-05-10T01:00:55.944484274Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:55.945375 env[1248]: time="2025-05-10T01:00:55.945362034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:55.946311 env[1248]: time="2025-05-10T01:00:55.946298618Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:55.947178 env[1248]: time="2025-05-10T01:00:55.947160120Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 01:00:55.948138 env[1248]: time="2025-05-10T01:00:55.948125561Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 10 01:00:56.390035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2715041866.mount: Deactivated successfully. May 10 01:00:56.391849 env[1248]: time="2025-05-10T01:00:56.391820114Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:56.392327 env[1248]: time="2025-05-10T01:00:56.392312748Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:56.393047 env[1248]: time="2025-05-10T01:00:56.393034290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:56.393771 env[1248]: time="2025-05-10T01:00:56.393757666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:56.394126 env[1248]: time="2025-05-10T01:00:56.394110510Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 10 01:00:56.394465 env[1248]: time="2025-05-10T01:00:56.394451753Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 10 01:00:56.840970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1603575280.mount: Deactivated successfully. May 10 01:00:58.666582 env[1248]: time="2025-05-10T01:00:58.666553497Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:58.684082 env[1248]: time="2025-05-10T01:00:58.684054467Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:58.694333 env[1248]: time="2025-05-10T01:00:58.694316767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:58.701881 env[1248]: time="2025-05-10T01:00:58.701864567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:00:58.702620 env[1248]: time="2025-05-10T01:00:58.702601217Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 10 01:00:59.022376 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 10 01:00:59.022523 systemd[1]: Stopped kubelet.service. May 10 01:00:59.025159 kernel: kauditd_printk_skb: 88 callbacks suppressed May 10 01:00:59.025215 kernel: audit: type=1130 audit(1746838859.021:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:59.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:59.023695 systemd[1]: Starting kubelet.service... May 10 01:00:59.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:59.029390 kernel: audit: type=1131 audit(1746838859.021:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:59.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:59.441218 systemd[1]: Started kubelet.service. May 10 01:00:59.448873 kernel: audit: type=1130 audit(1746838859.440:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:00:59.485248 kubelet[1635]: E0510 01:00:59.485226 1635 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 01:00:59.486214 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 01:00:59.486295 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 01:00:59.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:00:59.489297 kernel: audit: type=1131 audit(1746838859.485:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:01:00.616912 systemd[1]: Stopped kubelet.service. May 10 01:01:00.621832 kernel: audit: type=1130 audit(1746838860.615:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:01:00.621865 kernel: audit: type=1131 audit(1746838860.615:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:01:00.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:01:00.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:01:00.618531 systemd[1]: Starting kubelet.service... May 10 01:01:00.636766 systemd[1]: Reloading. May 10 01:01:00.677933 /usr/lib/systemd/system-generators/torcx-generator[1667]: time="2025-05-10T01:01:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 01:01:00.678123 /usr/lib/systemd/system-generators/torcx-generator[1667]: time="2025-05-10T01:01:00Z" level=info msg="torcx already run" May 10 01:01:00.740501 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 01:01:00.740601 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 01:01:00.752161 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 01:01:00.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.797114 kernel: audit: type=1400 audit(1746838860.791:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.797144 kernel: audit: type=1400 audit(1746838860.791:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.799438 kernel: audit: type=1400 audit(1746838860.791:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801867 kernel: audit: type=1400 audit(1746838860.791:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit: BPF prog-id=43 op=LOAD May 10 01:01:00.793000 audit: BPF prog-id=27 op=UNLOAD May 10 01:01:00.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit: BPF prog-id=44 op=LOAD May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit: BPF prog-id=45 op=LOAD May 10 01:01:00.796000 audit: BPF prog-id=28 op=UNLOAD May 10 01:01:00.796000 audit: BPF prog-id=29 op=UNLOAD May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit: BPF prog-id=46 op=LOAD May 10 01:01:00.798000 audit: BPF prog-id=36 op=UNLOAD May 10 01:01:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit: BPF prog-id=47 op=LOAD May 10 01:01:00.801000 audit: BPF prog-id=38 op=UNLOAD May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit: BPF prog-id=48 op=LOAD May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.804000 audit: BPF prog-id=52 op=LOAD May 10 01:01:00.804000 audit: BPF prog-id=32 op=UNLOAD May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit: BPF prog-id=53 op=LOAD May 10 01:01:00.805000 audit: BPF prog-id=33 op=UNLOAD May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit: BPF prog-id=54 op=LOAD May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit: BPF prog-id=55 op=LOAD May 10 01:01:00.805000 audit: BPF prog-id=34 op=UNLOAD May 10 01:01:00.805000 audit: BPF prog-id=35 op=UNLOAD May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.805000 audit: BPF prog-id=56 op=LOAD May 10 01:01:00.805000 audit: BPF prog-id=37 op=UNLOAD May 10 01:01:00.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:00.806000 audit: BPF prog-id=57 op=LOAD May 10 01:01:00.806000 audit: BPF prog-id=41 op=UNLOAD May 10 01:01:00.819721 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 10 01:01:00.819761 systemd[1]: kubelet.service: Failed with result 'signal'. May 10 01:01:00.819926 systemd[1]: Stopped kubelet.service. May 10 01:01:00.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 01:01:00.821258 systemd[1]: Starting kubelet.service... May 10 01:01:01.100106 systemd[1]: Started kubelet.service. May 10 01:01:01.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:01:01.136162 update_engine[1243]: I0510 01:01:01.135931 1243 update_attempter.cc:509] Updating boot flags... May 10 01:01:01.222916 kubelet[1731]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 01:01:01.223238 kubelet[1731]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 01:01:01.223312 kubelet[1731]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 01:01:01.224565 kubelet[1731]: I0510 01:01:01.224543 1731 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 01:01:01.518234 kubelet[1731]: I0510 01:01:01.518058 1731 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 01:01:01.518234 kubelet[1731]: I0510 01:01:01.518073 1731 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 01:01:01.518408 kubelet[1731]: I0510 01:01:01.518336 1731 server.go:929] "Client rotation is on, will bootstrap in background" May 10 01:01:01.536282 kubelet[1731]: I0510 01:01:01.535944 1731 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 01:01:01.536522 kubelet[1731]: E0510 01:01:01.536508 1731 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.100:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:01.542712 kubelet[1731]: E0510 01:01:01.542693 1731 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 01:01:01.542712 kubelet[1731]: I0510 01:01:01.542710 1731 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 01:01:01.545509 kubelet[1731]: I0510 01:01:01.545498 1731 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 01:01:01.546443 kubelet[1731]: I0510 01:01:01.546430 1731 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 01:01:01.546524 kubelet[1731]: I0510 01:01:01.546508 1731 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 01:01:01.546613 kubelet[1731]: I0510 01:01:01.546523 1731 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 01:01:01.546680 kubelet[1731]: I0510 01:01:01.546616 1731 topology_manager.go:138] "Creating topology manager with none policy" May 10 01:01:01.546680 kubelet[1731]: I0510 01:01:01.546622 1731 container_manager_linux.go:300] "Creating device plugin manager" May 10 01:01:01.546680 kubelet[1731]: I0510 01:01:01.546668 1731 state_mem.go:36] "Initialized new in-memory state store" May 10 01:01:01.548123 kubelet[1731]: I0510 01:01:01.548112 1731 kubelet.go:408] "Attempting to sync node with API server" May 10 01:01:01.548151 kubelet[1731]: I0510 01:01:01.548126 1731 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 01:01:01.548151 kubelet[1731]: I0510 01:01:01.548144 1731 kubelet.go:314] "Adding apiserver pod source" May 10 01:01:01.548192 kubelet[1731]: I0510 01:01:01.548153 1731 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 01:01:01.567531 kubelet[1731]: W0510 01:01:01.567512 1731 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 10 01:01:01.567597 kubelet[1731]: E0510 01:01:01.567586 1731 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:01.567674 kubelet[1731]: I0510 01:01:01.567665 1731 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 01:01:01.571229 kubelet[1731]: W0510 01:01:01.571206 1731 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 10 01:01:01.571273 kubelet[1731]: E0510 01:01:01.571235 1731 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:01.572192 kubelet[1731]: I0510 01:01:01.572185 1731 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 01:01:01.572271 kubelet[1731]: W0510 01:01:01.572265 1731 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 01:01:01.572651 kubelet[1731]: I0510 01:01:01.572644 1731 server.go:1269] "Started kubelet" May 10 01:01:01.573232 kubelet[1731]: I0510 01:01:01.573220 1731 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 01:01:01.573843 kubelet[1731]: I0510 01:01:01.573834 1731 server.go:460] "Adding debug handlers to kubelet server" May 10 01:01:01.573000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:01.573000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:01:01.573000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000847590 a1=c000807bd8 a2=c000847560 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.573000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:01:01.575214 kubelet[1731]: I0510 01:01:01.575202 1731 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 01:01:01.573000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:01.573000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:01:01.573000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00087ee40 a1=c000807bf0 a2=c000847620 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.573000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:01:01.575394 kubelet[1731]: I0510 01:01:01.575384 1731 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 01:01:01.575471 kubelet[1731]: I0510 01:01:01.575465 1731 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 01:01:01.575882 kubelet[1731]: I0510 01:01:01.575857 1731 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 01:01:01.575968 kubelet[1731]: I0510 01:01:01.575958 1731 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 01:01:01.577454 kubelet[1731]: E0510 01:01:01.576528 1731 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.100:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183e04b07fe27737 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-10 01:01:01.572634423 +0000 UTC m=+0.468868551,LastTimestamp:2025-05-10 01:01:01.572634423 +0000 UTC m=+0.468868551,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 10 01:01:01.578004 kubelet[1731]: E0510 01:01:01.577993 1731 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 01:01:01.578086 kubelet[1731]: I0510 01:01:01.578074 1731 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 01:01:01.578000 audit[1759]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:01.578000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6f54faa0 a2=0 a3=7ffc6f54fa8c items=0 ppid=1731 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 01:01:01.578000 audit[1760]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:01.578000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3bf54dd0 a2=0 a3=7fff3bf54dbc items=0 ppid=1731 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 01:01:01.580384 kubelet[1731]: E0510 01:01:01.580361 1731 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 01:01:01.580384 kubelet[1731]: I0510 01:01:01.580377 1731 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 01:01:01.580466 kubelet[1731]: I0510 01:01:01.580456 1731 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 01:01:01.580496 kubelet[1731]: I0510 01:01:01.580481 1731 reconciler.go:26] "Reconciler: start to sync state" May 10 01:01:01.580738 kubelet[1731]: I0510 01:01:01.580727 1731 factory.go:221] Registration of the systemd container factory successfully May 10 01:01:01.580786 kubelet[1731]: I0510 01:01:01.580780 1731 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 01:01:01.580979 kubelet[1731]: W0510 01:01:01.580961 1731 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 10 01:01:01.581009 kubelet[1731]: E0510 01:01:01.580982 1731 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:01.581449 kubelet[1731]: I0510 01:01:01.581424 1731 factory.go:221] Registration of the containerd container factory successfully May 10 01:01:01.580000 audit[1762]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:01.580000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffeaa7a870 a2=0 a3=7fffeaa7a85c items=0 ppid=1731 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 01:01:01.581000 audit[1764]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:01.581000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe47cee670 a2=0 a3=7ffe47cee65c items=0 ppid=1731 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 01:01:01.589000 audit[1767]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:01.589000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc4bf8c380 a2=0 a3=7ffc4bf8c36c items=0 ppid=1731 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 01:01:01.590956 kubelet[1731]: I0510 01:01:01.590918 1731 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 01:01:01.590000 audit[1768]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:01.590000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0dadb0a0 a2=0 a3=7ffc0dadb08c items=0 ppid=1731 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 01:01:01.591801 kubelet[1731]: I0510 01:01:01.591766 1731 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 01:01:01.591801 kubelet[1731]: I0510 01:01:01.591775 1731 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 01:01:01.591801 kubelet[1731]: I0510 01:01:01.591785 1731 kubelet.go:2321] "Starting kubelet main sync loop" May 10 01:01:01.591858 kubelet[1731]: E0510 01:01:01.591807 1731 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 01:01:01.591962 kubelet[1731]: E0510 01:01:01.591948 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="200ms" May 10 01:01:01.592000 audit[1769]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:01.592000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc39f2e210 a2=0 a3=7ffc39f2e1fc items=0 ppid=1731 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 01:01:01.592000 audit[1770]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:01.592000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffae6573e0 a2=0 a3=7fffae6573cc items=0 ppid=1731 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 01:01:01.593000 audit[1771]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:01.593000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc020d3db0 a2=0 a3=7ffc020d3d9c items=0 ppid=1731 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 01:01:01.594000 audit[1772]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:01.594000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4c3a99a0 a2=0 a3=7ffd4c3a998c items=0 ppid=1731 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 01:01:01.594000 audit[1773]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:01.594000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcb8a46b50 a2=0 a3=7ffcb8a46b3c items=0 ppid=1731 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 01:01:01.595000 audit[1774]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:01.595000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff76580ba0 a2=0 a3=7fff76580b8c items=0 ppid=1731 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 01:01:01.600032 kubelet[1731]: W0510 01:01:01.600008 1731 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 10 01:01:01.600069 kubelet[1731]: E0510 01:01:01.600038 1731 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:01.600368 kubelet[1731]: I0510 01:01:01.600357 1731 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 01:01:01.600401 kubelet[1731]: I0510 01:01:01.600367 1731 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 01:01:01.600401 kubelet[1731]: I0510 01:01:01.600377 1731 state_mem.go:36] "Initialized new in-memory state store" May 10 01:01:01.601313 kubelet[1731]: I0510 01:01:01.601302 1731 policy_none.go:49] "None policy: Start" May 10 01:01:01.601522 kubelet[1731]: I0510 01:01:01.601511 1731 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 01:01:01.601522 kubelet[1731]: I0510 01:01:01.601522 1731 state_mem.go:35] "Initializing new in-memory state store" May 10 01:01:01.603857 systemd[1]: Created slice kubepods.slice. May 10 01:01:01.606427 systemd[1]: Created slice kubepods-besteffort.slice. May 10 01:01:01.611602 systemd[1]: Created slice kubepods-burstable.slice. May 10 01:01:01.612489 kubelet[1731]: I0510 01:01:01.612476 1731 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 01:01:01.611000 audit[1731]: AVC avc: denied { mac_admin } for pid=1731 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:01.611000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:01:01.611000 audit[1731]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e09e90 a1=c000ce83c0 a2=c000e09e60 a3=25 items=0 ppid=1 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:01.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:01:01.612625 kubelet[1731]: I0510 01:01:01.612517 1731 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 01:01:01.612625 kubelet[1731]: I0510 01:01:01.612566 1731 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 01:01:01.612625 kubelet[1731]: I0510 01:01:01.612576 1731 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 01:01:01.612855 kubelet[1731]: I0510 01:01:01.612833 1731 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 01:01:01.613511 kubelet[1731]: E0510 01:01:01.613500 1731 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 10 01:01:01.697969 systemd[1]: Created slice kubepods-burstable-pod017255a87213f5d73e40f36ac53d7ca5.slice. May 10 01:01:01.707383 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 10 01:01:01.710916 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 10 01:01:01.713901 kubelet[1731]: I0510 01:01:01.713889 1731 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 01:01:01.714260 kubelet[1731]: E0510 01:01:01.714226 1731 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 10 01:01:01.781603 kubelet[1731]: I0510 01:01:01.781589 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/017255a87213f5d73e40f36ac53d7ca5-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"017255a87213f5d73e40f36ac53d7ca5\") " pod="kube-system/kube-apiserver-localhost" May 10 01:01:01.781728 kubelet[1731]: I0510 01:01:01.781715 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/017255a87213f5d73e40f36ac53d7ca5-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"017255a87213f5d73e40f36ac53d7ca5\") " pod="kube-system/kube-apiserver-localhost" May 10 01:01:01.781820 kubelet[1731]: I0510 01:01:01.781807 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/017255a87213f5d73e40f36ac53d7ca5-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"017255a87213f5d73e40f36ac53d7ca5\") " pod="kube-system/kube-apiserver-localhost" May 10 01:01:01.781912 kubelet[1731]: I0510 01:01:01.781901 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:01.782001 kubelet[1731]: I0510 01:01:01.781990 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:01.782084 kubelet[1731]: I0510 01:01:01.782073 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:01.782167 kubelet[1731]: I0510 01:01:01.782156 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:01.782248 kubelet[1731]: I0510 01:01:01.782237 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:01.782344 kubelet[1731]: I0510 01:01:01.782325 1731 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 10 01:01:01.793038 kubelet[1731]: E0510 01:01:01.793021 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="400ms" May 10 01:01:01.915971 kubelet[1731]: I0510 01:01:01.915952 1731 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 01:01:01.916314 kubelet[1731]: E0510 01:01:01.916292 1731 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 10 01:01:02.005812 env[1248]: time="2025-05-10T01:01:02.005774772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:017255a87213f5d73e40f36ac53d7ca5,Namespace:kube-system,Attempt:0,}" May 10 01:01:02.009475 env[1248]: time="2025-05-10T01:01:02.009451728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 10 01:01:02.013402 env[1248]: time="2025-05-10T01:01:02.013380189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 10 01:01:02.194417 kubelet[1731]: E0510 01:01:02.194365 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="800ms" May 10 01:01:02.317655 kubelet[1731]: I0510 01:01:02.317640 1731 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 01:01:02.318045 kubelet[1731]: E0510 01:01:02.318030 1731 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 10 01:01:02.423703 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2577132546.mount: Deactivated successfully. May 10 01:01:02.426225 env[1248]: time="2025-05-10T01:01:02.426205786Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.426802 env[1248]: time="2025-05-10T01:01:02.426790487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.427218 env[1248]: time="2025-05-10T01:01:02.427206865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.427638 env[1248]: time="2025-05-10T01:01:02.427626996Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.428053 env[1248]: time="2025-05-10T01:01:02.428042421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.429311 env[1248]: time="2025-05-10T01:01:02.429300101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.430953 env[1248]: time="2025-05-10T01:01:02.430941517Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.437072 env[1248]: time="2025-05-10T01:01:02.437052012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.438180 env[1248]: time="2025-05-10T01:01:02.438113740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.438810 env[1248]: time="2025-05-10T01:01:02.438794875Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.439326 env[1248]: time="2025-05-10T01:01:02.439308885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.439840 env[1248]: time="2025-05-10T01:01:02.439788209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:02.459864 env[1248]: time="2025-05-10T01:01:02.447952947Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:01:02.459864 env[1248]: time="2025-05-10T01:01:02.447972900Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:01:02.459864 env[1248]: time="2025-05-10T01:01:02.447979521Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:01:02.459864 env[1248]: time="2025-05-10T01:01:02.448053621Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60f22f57f065254711c621a67c3a4662c7d9d7c61f67b6899988d79d5eb313cf pid=1787 runtime=io.containerd.runc.v2 May 10 01:01:02.460329 env[1248]: time="2025-05-10T01:01:02.450596455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:01:02.460329 env[1248]: time="2025-05-10T01:01:02.450616883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:01:02.460329 env[1248]: time="2025-05-10T01:01:02.450623237Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:01:02.460329 env[1248]: time="2025-05-10T01:01:02.450702665Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3df69d0dc2aa30716be2714bb5bd9292498049360dc1c8bacaa930d889c932ec pid=1798 runtime=io.containerd.runc.v2 May 10 01:01:02.472495 env[1248]: time="2025-05-10T01:01:02.472160966Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:01:02.472495 env[1248]: time="2025-05-10T01:01:02.472193964Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:01:02.472495 env[1248]: time="2025-05-10T01:01:02.472202080Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:01:02.472495 env[1248]: time="2025-05-10T01:01:02.472272886Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30542863cdb73be43713a89e3f20d13daf0aac12e9f6b8c441a0aab65ab8beb4 pid=1823 runtime=io.containerd.runc.v2 May 10 01:01:02.473656 systemd[1]: Started cri-containerd-3df69d0dc2aa30716be2714bb5bd9292498049360dc1c8bacaa930d889c932ec.scope. May 10 01:01:02.483196 systemd[1]: Started cri-containerd-60f22f57f065254711c621a67c3a4662c7d9d7c61f67b6899988d79d5eb313cf.scope. May 10 01:01:02.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.493000 audit: BPF prog-id=58 op=LOAD May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1798 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663639643064633261613330373136626532373134626235626439 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1798 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663639643064633261613330373136626532373134626235626439 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit: BPF prog-id=59 op=LOAD May 10 01:01:02.494000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000404780 items=0 ppid=1798 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663639643064633261613330373136626532373134626235626439 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit: BPF prog-id=60 op=LOAD May 10 01:01:02.494000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0004047c8 items=0 ppid=1798 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663639643064633261613330373136626532373134626235626439 May 10 01:01:02.494000 audit: BPF prog-id=60 op=UNLOAD May 10 01:01:02.494000 audit: BPF prog-id=59 op=UNLOAD May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.494000 audit: BPF prog-id=61 op=LOAD May 10 01:01:02.494000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000404bd8 items=0 ppid=1798 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663639643064633261613330373136626532373134626235626439 May 10 01:01:02.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit: BPF prog-id=62 op=LOAD May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1787 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663232663537663036353235343731316336323161363763336134 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1787 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663232663537663036353235343731316336323161363763336134 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit: BPF prog-id=63 op=LOAD May 10 01:01:02.500000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001edac0 items=0 ppid=1787 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663232663537663036353235343731316336323161363763336134 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit: BPF prog-id=64 op=LOAD May 10 01:01:02.500000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001edb08 items=0 ppid=1787 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663232663537663036353235343731316336323161363763336134 May 10 01:01:02.500000 audit: BPF prog-id=64 op=UNLOAD May 10 01:01:02.500000 audit: BPF prog-id=63 op=UNLOAD May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.500000 audit: BPF prog-id=65 op=LOAD May 10 01:01:02.500000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001edf18 items=0 ppid=1787 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630663232663537663036353235343731316336323161363763336134 May 10 01:01:02.504325 systemd[1]: Started cri-containerd-30542863cdb73be43713a89e3f20d13daf0aac12e9f6b8c441a0aab65ab8beb4.scope. May 10 01:01:02.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.520000 audit: BPF prog-id=66 op=LOAD May 10 01:01:02.523000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1823 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353432383633636462373362653433373133613839653366323064 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1823 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353432383633636462373362653433373133613839653366323064 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.523000 audit: BPF prog-id=67 op=LOAD May 10 01:01:02.523000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00029daf0 items=0 ppid=1823 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353432383633636462373362653433373133613839653366323064 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit: BPF prog-id=68 op=LOAD May 10 01:01:02.524000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00029db38 items=0 ppid=1823 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353432383633636462373362653433373133613839653366323064 May 10 01:01:02.524000 audit: BPF prog-id=68 op=UNLOAD May 10 01:01:02.524000 audit: BPF prog-id=67 op=UNLOAD May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { perfmon } for pid=1854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit[1854]: AVC avc: denied { bpf } for pid=1854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.524000 audit: BPF prog-id=69 op=LOAD May 10 01:01:02.524000 audit[1854]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00029df48 items=0 ppid=1823 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353432383633636462373362653433373133613839653366323064 May 10 01:01:02.528398 env[1248]: time="2025-05-10T01:01:02.528377362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"3df69d0dc2aa30716be2714bb5bd9292498049360dc1c8bacaa930d889c932ec\"" May 10 01:01:02.531457 kubelet[1731]: W0510 01:01:02.531405 1731 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 10 01:01:02.531457 kubelet[1731]: E0510 01:01:02.531439 1731 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:02.532927 env[1248]: time="2025-05-10T01:01:02.532903880Z" level=info msg="CreateContainer within sandbox \"3df69d0dc2aa30716be2714bb5bd9292498049360dc1c8bacaa930d889c932ec\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 01:01:02.533081 env[1248]: time="2025-05-10T01:01:02.533064643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:017255a87213f5d73e40f36ac53d7ca5,Namespace:kube-system,Attempt:0,} returns sandbox id \"60f22f57f065254711c621a67c3a4662c7d9d7c61f67b6899988d79d5eb313cf\"" May 10 01:01:02.534977 env[1248]: time="2025-05-10T01:01:02.534960054Z" level=info msg="CreateContainer within sandbox \"60f22f57f065254711c621a67c3a4662c7d9d7c61f67b6899988d79d5eb313cf\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 01:01:02.540943 env[1248]: time="2025-05-10T01:01:02.540928798Z" level=info msg="CreateContainer within sandbox \"3df69d0dc2aa30716be2714bb5bd9292498049360dc1c8bacaa930d889c932ec\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b22a5def05092dc981c36a101a834b1e2e418abb225c56803b21fd5a608e824b\"" May 10 01:01:02.541224 env[1248]: time="2025-05-10T01:01:02.541212412Z" level=info msg="StartContainer for \"b22a5def05092dc981c36a101a834b1e2e418abb225c56803b21fd5a608e824b\"" May 10 01:01:02.541835 env[1248]: time="2025-05-10T01:01:02.541818170Z" level=info msg="CreateContainer within sandbox \"60f22f57f065254711c621a67c3a4662c7d9d7c61f67b6899988d79d5eb313cf\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d9554a1aa1bc4801c1f545c11f3b568025f4c1511ea2f6f50d74f6345f021ff5\"" May 10 01:01:02.542039 env[1248]: time="2025-05-10T01:01:02.542027922Z" level=info msg="StartContainer for \"d9554a1aa1bc4801c1f545c11f3b568025f4c1511ea2f6f50d74f6345f021ff5\"" May 10 01:01:02.554164 systemd[1]: Started cri-containerd-b22a5def05092dc981c36a101a834b1e2e418abb225c56803b21fd5a608e824b.scope. May 10 01:01:02.559943 systemd[1]: Started cri-containerd-d9554a1aa1bc4801c1f545c11f3b568025f4c1511ea2f6f50d74f6345f021ff5.scope. May 10 01:01:02.563092 env[1248]: time="2025-05-10T01:01:02.563065553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"30542863cdb73be43713a89e3f20d13daf0aac12e9f6b8c441a0aab65ab8beb4\"" May 10 01:01:02.565937 env[1248]: time="2025-05-10T01:01:02.565922831Z" level=info msg="CreateContainer within sandbox \"30542863cdb73be43713a89e3f20d13daf0aac12e9f6b8c441a0aab65ab8beb4\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 01:01:02.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit: BPF prog-id=70 op=LOAD May 10 01:01:02.568000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.568000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1798 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326135646566303530393264633938316333366131303161383334 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1798 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326135646566303530393264633938316333366131303161383334 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit: BPF prog-id=71 op=LOAD May 10 01:01:02.569000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ec0d0 items=0 ppid=1798 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326135646566303530393264633938316333366131303161383334 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.569000 audit: BPF prog-id=72 op=LOAD May 10 01:01:02.569000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ec118 items=0 ppid=1798 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326135646566303530393264633938316333366131303161383334 May 10 01:01:02.570000 audit: BPF prog-id=72 op=UNLOAD May 10 01:01:02.570000 audit: BPF prog-id=71 op=UNLOAD May 10 01:01:02.570000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { perfmon } for pid=1914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit[1914]: AVC avc: denied { bpf } for pid=1914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.570000 audit: BPF prog-id=73 op=LOAD May 10 01:01:02.570000 audit[1914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ec528 items=0 ppid=1798 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232326135646566303530393264633938316333366131303161383334 May 10 01:01:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit: BPF prog-id=74 op=LOAD May 10 01:01:02.572000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1787 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439353534613161613162633438303163316635343563313166336235 May 10 01:01:02.572000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.572000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1787 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439353534613161613162633438303163316635343563313166336235 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit: BPF prog-id=75 op=LOAD May 10 01:01:02.573000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfd10 items=0 ppid=1787 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439353534613161613162633438303163316635343563313166336235 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.573000 audit: BPF prog-id=76 op=LOAD May 10 01:01:02.573000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd58 items=0 ppid=1787 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439353534613161613162633438303163316635343563313166336235 May 10 01:01:02.573000 audit: BPF prog-id=76 op=UNLOAD May 10 01:01:02.574000 audit: BPF prog-id=75 op=UNLOAD May 10 01:01:02.574000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.574000 audit: BPF prog-id=77 op=LOAD May 10 01:01:02.574000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e6168 items=0 ppid=1787 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439353534613161613162633438303163316635343563313166336235 May 10 01:01:02.577663 env[1248]: time="2025-05-10T01:01:02.577643786Z" level=info msg="CreateContainer within sandbox \"30542863cdb73be43713a89e3f20d13daf0aac12e9f6b8c441a0aab65ab8beb4\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"da34dee44eec57bb2a185c905a6451096581b3a02203cf7b01856dcba92bc494\"" May 10 01:01:02.577995 env[1248]: time="2025-05-10T01:01:02.577970501Z" level=info msg="StartContainer for \"da34dee44eec57bb2a185c905a6451096581b3a02203cf7b01856dcba92bc494\"" May 10 01:01:02.586906 systemd[1]: Started cri-containerd-da34dee44eec57bb2a185c905a6451096581b3a02203cf7b01856dcba92bc494.scope. May 10 01:01:02.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.604000 audit: BPF prog-id=78 op=LOAD May 10 01:01:02.604000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.604000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1823 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333464656534346565633537626232613138356339303561363435 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1823 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333464656534346565633537626232613138356339303561363435 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit: BPF prog-id=79 op=LOAD May 10 01:01:02.605000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027deb0 items=0 ppid=1823 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333464656534346565633537626232613138356339303561363435 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.605000 audit: BPF prog-id=80 op=LOAD May 10 01:01:02.605000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027def8 items=0 ppid=1823 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333464656534346565633537626232613138356339303561363435 May 10 01:01:02.606000 audit: BPF prog-id=80 op=UNLOAD May 10 01:01:02.606000 audit: BPF prog-id=79 op=UNLOAD May 10 01:01:02.606000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:02.606000 audit: BPF prog-id=81 op=LOAD May 10 01:01:02.606000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ee308 items=0 ppid=1823 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:02.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333464656534346565633537626232613138356339303561363435 May 10 01:01:02.611758 env[1248]: time="2025-05-10T01:01:02.611739826Z" level=info msg="StartContainer for \"d9554a1aa1bc4801c1f545c11f3b568025f4c1511ea2f6f50d74f6345f021ff5\" returns successfully" May 10 01:01:02.620418 env[1248]: time="2025-05-10T01:01:02.620400009Z" level=info msg="StartContainer for \"b22a5def05092dc981c36a101a834b1e2e418abb225c56803b21fd5a608e824b\" returns successfully" May 10 01:01:02.637779 env[1248]: time="2025-05-10T01:01:02.637749466Z" level=info msg="StartContainer for \"da34dee44eec57bb2a185c905a6451096581b3a02203cf7b01856dcba92bc494\" returns successfully" May 10 01:01:02.651328 kubelet[1731]: W0510 01:01:02.651292 1731 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 10 01:01:02.651414 kubelet[1731]: E0510 01:01:02.651333 1731 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:02.655669 kubelet[1731]: E0510 01:01:02.655622 1731 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.100:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183e04b07fe27737 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-10 01:01:01.572634423 +0000 UTC m=+0.468868551,LastTimestamp:2025-05-10 01:01:01.572634423 +0000 UTC m=+0.468868551,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 10 01:01:02.981030 kubelet[1731]: W0510 01:01:02.980993 1731 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 10 01:01:02.981123 kubelet[1731]: E0510 01:01:02.981033 1731 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:02.995496 kubelet[1731]: E0510 01:01:02.995478 1731 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="1.6s" May 10 01:01:03.041923 kubelet[1731]: W0510 01:01:03.041891 1731 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 10 01:01:03.041997 kubelet[1731]: E0510 01:01:03.041928 1731 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.100:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.100:6443: connect: connection refused" logger="UnhandledError" May 10 01:01:03.119143 kubelet[1731]: I0510 01:01:03.119128 1731 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 01:01:03.119278 kubelet[1731]: E0510 01:01:03.119265 1731 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 10 01:01:03.188000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:03.188000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0000589f0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:01:03.188000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:01:03.188000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:03.188000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0002421e0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:01:03.188000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:01:03.977000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:03.977000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005931200 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:01:03.977000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:03.977000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006088630 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:01:03.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:01:03.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:01:03.977000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:03.977000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007223240 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:01:03.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:01:03.982000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:03.982000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c005931bc0 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:01:03.982000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:01:03.996000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:03.996000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0025b2000 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:01:03.996000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:01:03.997000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:03.997000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c006d9af30 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:01:03.997000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:01:04.380832 kubelet[1731]: E0510 01:01:04.380802 1731 csi_plugin.go:305] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 10 01:01:04.598262 kubelet[1731]: E0510 01:01:04.598218 1731 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 10 01:01:04.720736 kubelet[1731]: I0510 01:01:04.720660 1731 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 01:01:04.731251 kubelet[1731]: I0510 01:01:04.731236 1731 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 10 01:01:04.731374 kubelet[1731]: E0510 01:01:04.731362 1731 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 10 01:01:04.737131 kubelet[1731]: E0510 01:01:04.737116 1731 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 10 01:01:05.569037 kubelet[1731]: I0510 01:01:05.569001 1731 apiserver.go:52] "Watching apiserver" May 10 01:01:05.581064 kubelet[1731]: I0510 01:01:05.581041 1731 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 01:01:05.642646 systemd[1]: Reloading. May 10 01:01:05.700993 /usr/lib/systemd/system-generators/torcx-generator[2036]: time="2025-05-10T01:01:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 01:01:05.704603 /usr/lib/systemd/system-generators/torcx-generator[2036]: time="2025-05-10T01:01:05Z" level=info msg="torcx already run" May 10 01:01:05.749037 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 01:01:05.749047 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 01:01:05.761515 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 01:01:05.816753 kernel: kauditd_printk_skb: 626 callbacks suppressed May 10 01:01:05.816814 kernel: audit: type=1400 audit(1746838865.807:542): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816833 kernel: audit: type=1400 audit(1746838865.808:543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816849 kernel: audit: type=1400 audit(1746838865.808:544): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.820893 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 01:01:05.820924 kernel: audit: type=1400 audit(1746838865.808:545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.821005 kernel: audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 May 10 01:01:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.823925 kernel: audit: type=1400 audit(1746838865.808:546): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.823948 kernel: audit: backlog limit exceeded May 10 01:01:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826730 kernel: audit: type=1400 audit(1746838865.808:547): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826753 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 01:01:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit: BPF prog-id=82 op=LOAD May 10 01:01:05.813000 audit: BPF prog-id=43 op=UNLOAD May 10 01:01:05.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit: BPF prog-id=83 op=LOAD May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit: BPF prog-id=84 op=LOAD May 10 01:01:05.815000 audit: BPF prog-id=44 op=UNLOAD May 10 01:01:05.815000 audit: BPF prog-id=45 op=UNLOAD May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit: BPF prog-id=85 op=LOAD May 10 01:01:05.816000 audit: BPF prog-id=46 op=UNLOAD May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit: BPF prog-id=86 op=LOAD May 10 01:01:05.816000 audit: BPF prog-id=47 op=UNLOAD May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.816000 audit: BPF prog-id=87 op=LOAD May 10 01:01:05.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit: BPF prog-id=88 op=LOAD May 10 01:01:05.826000 audit: BPF prog-id=48 op=UNLOAD May 10 01:01:05.826000 audit: BPF prog-id=49 op=UNLOAD May 10 01:01:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit: BPF prog-id=89 op=LOAD May 10 01:01:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.827000 audit: BPF prog-id=90 op=LOAD May 10 01:01:05.827000 audit: BPF prog-id=50 op=UNLOAD May 10 01:01:05.827000 audit: BPF prog-id=51 op=UNLOAD May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit: BPF prog-id=91 op=LOAD May 10 01:01:05.828000 audit: BPF prog-id=66 op=UNLOAD May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit: BPF prog-id=92 op=LOAD May 10 01:01:05.829000 audit: BPF prog-id=78 op=UNLOAD May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit: BPF prog-id=93 op=LOAD May 10 01:01:05.829000 audit: BPF prog-id=52 op=UNLOAD May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit: BPF prog-id=94 op=LOAD May 10 01:01:05.830000 audit: BPF prog-id=62 op=UNLOAD May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit: BPF prog-id=95 op=LOAD May 10 01:01:05.830000 audit: BPF prog-id=53 op=UNLOAD May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit: BPF prog-id=96 op=LOAD May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit: BPF prog-id=97 op=LOAD May 10 01:01:05.830000 audit: BPF prog-id=54 op=UNLOAD May 10 01:01:05.830000 audit: BPF prog-id=55 op=UNLOAD May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit: BPF prog-id=98 op=LOAD May 10 01:01:05.831000 audit: BPF prog-id=56 op=UNLOAD May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit: BPF prog-id=99 op=LOAD May 10 01:01:05.831000 audit: BPF prog-id=70 op=UNLOAD May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.831000 audit: BPF prog-id=100 op=LOAD May 10 01:01:05.831000 audit: BPF prog-id=74 op=UNLOAD May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit: BPF prog-id=101 op=LOAD May 10 01:01:05.832000 audit: BPF prog-id=58 op=UNLOAD May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:05.832000 audit: BPF prog-id=102 op=LOAD May 10 01:01:05.832000 audit: BPF prog-id=57 op=UNLOAD May 10 01:01:05.843928 kubelet[1731]: I0510 01:01:05.842568 1731 dynamic_cafile_content.go:174] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 01:01:05.842781 systemd[1]: Stopping kubelet.service... May 10 01:01:05.863667 systemd[1]: kubelet.service: Deactivated successfully. May 10 01:01:05.863804 systemd[1]: Stopped kubelet.service. May 10 01:01:05.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:01:05.865765 systemd[1]: Starting kubelet.service... May 10 01:01:06.946572 systemd[1]: Started kubelet.service. May 10 01:01:06.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:01:07.003594 kubelet[2100]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 01:01:07.003594 kubelet[2100]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 01:01:07.003594 kubelet[2100]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 01:01:07.020092 kubelet[2100]: I0510 01:01:07.019683 2100 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 01:01:07.029308 kubelet[2100]: I0510 01:01:07.029275 2100 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 01:01:07.029308 kubelet[2100]: I0510 01:01:07.029295 2100 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 01:01:07.029422 kubelet[2100]: I0510 01:01:07.029411 2100 server.go:929] "Client rotation is on, will bootstrap in background" May 10 01:01:07.030395 kubelet[2100]: I0510 01:01:07.030207 2100 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 01:01:07.031355 kubelet[2100]: I0510 01:01:07.031342 2100 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 01:01:07.037357 kubelet[2100]: E0510 01:01:07.037340 2100 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 01:01:07.037777 kubelet[2100]: I0510 01:01:07.037768 2100 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 01:01:07.042472 kubelet[2100]: I0510 01:01:07.042463 2100 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 01:01:07.042586 kubelet[2100]: I0510 01:01:07.042578 2100 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 01:01:07.043125 kubelet[2100]: I0510 01:01:07.043106 2100 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 01:01:07.043811 kubelet[2100]: I0510 01:01:07.043170 2100 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 01:01:07.043904 kubelet[2100]: I0510 01:01:07.043896 2100 topology_manager.go:138] "Creating topology manager with none policy" May 10 01:01:07.043951 kubelet[2100]: I0510 01:01:07.043944 2100 container_manager_linux.go:300] "Creating device plugin manager" May 10 01:01:07.044015 kubelet[2100]: I0510 01:01:07.044008 2100 state_mem.go:36] "Initialized new in-memory state store" May 10 01:01:07.044495 kubelet[2100]: I0510 01:01:07.044487 2100 kubelet.go:408] "Attempting to sync node with API server" May 10 01:01:07.044547 kubelet[2100]: I0510 01:01:07.044540 2100 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 01:01:07.044604 kubelet[2100]: I0510 01:01:07.044597 2100 kubelet.go:314] "Adding apiserver pod source" May 10 01:01:07.045106 kubelet[2100]: I0510 01:01:07.044652 2100 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 01:01:07.059365 kubelet[2100]: I0510 01:01:07.059353 2100 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 01:01:07.059690 kubelet[2100]: I0510 01:01:07.059682 2100 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 01:01:07.061212 kubelet[2100]: I0510 01:01:07.061205 2100 server.go:1269] "Started kubelet" May 10 01:01:07.062820 kubelet[2100]: I0510 01:01:07.061875 2100 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 01:01:07.062820 kubelet[2100]: I0510 01:01:07.062557 2100 server.go:460] "Adding debug handlers to kubelet server" May 10 01:01:07.062000 audit[2100]: AVC avc: denied { mac_admin } for pid=2100 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:07.062000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:01:07.062000 audit[2100]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000059620 a1=c000c4ef30 a2=c0000595c0 a3=25 items=0 ppid=1 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:07.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:01:07.062000 audit[2100]: AVC avc: denied { mac_admin } for pid=2100 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:07.062000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:01:07.062000 audit[2100]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00037dbc0 a1=c000c4ef48 a2=c000059740 a3=25 items=0 ppid=1 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:07.062000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:01:07.064327 kubelet[2100]: I0510 01:01:07.063875 2100 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 01:01:07.064327 kubelet[2100]: I0510 01:01:07.063902 2100 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 01:01:07.064327 kubelet[2100]: I0510 01:01:07.063915 2100 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 01:01:07.069918 kubelet[2100]: I0510 01:01:07.069902 2100 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 01:01:07.071835 kubelet[2100]: I0510 01:01:07.071653 2100 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 01:01:07.073566 kubelet[2100]: I0510 01:01:07.073205 2100 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 01:01:07.073566 kubelet[2100]: I0510 01:01:07.073279 2100 reconciler.go:26] "Reconciler: start to sync state" May 10 01:01:07.074604 kubelet[2100]: I0510 01:01:07.074207 2100 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 01:01:07.075117 kubelet[2100]: I0510 01:01:07.074877 2100 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 01:01:07.075117 kubelet[2100]: I0510 01:01:07.074900 2100 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 01:01:07.075117 kubelet[2100]: I0510 01:01:07.074910 2100 kubelet.go:2321] "Starting kubelet main sync loop" May 10 01:01:07.075117 kubelet[2100]: E0510 01:01:07.074931 2100 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 01:01:07.084310 kubelet[2100]: I0510 01:01:07.081424 2100 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 01:01:07.084310 kubelet[2100]: I0510 01:01:07.081555 2100 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 01:01:07.086207 kubelet[2100]: I0510 01:01:07.084755 2100 factory.go:221] Registration of the systemd container factory successfully May 10 01:01:07.086207 kubelet[2100]: I0510 01:01:07.084807 2100 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 01:01:07.086332 kubelet[2100]: I0510 01:01:07.086208 2100 factory.go:221] Registration of the containerd container factory successfully May 10 01:01:07.135430 kubelet[2100]: I0510 01:01:07.135417 2100 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 01:01:07.135541 kubelet[2100]: I0510 01:01:07.135532 2100 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 01:01:07.135593 kubelet[2100]: I0510 01:01:07.135586 2100 state_mem.go:36] "Initialized new in-memory state store" May 10 01:01:07.135730 kubelet[2100]: I0510 01:01:07.135722 2100 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 01:01:07.135876 kubelet[2100]: I0510 01:01:07.135853 2100 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 01:01:07.135922 kubelet[2100]: I0510 01:01:07.135916 2100 policy_none.go:49] "None policy: Start" May 10 01:01:07.136337 kubelet[2100]: I0510 01:01:07.136329 2100 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 01:01:07.136400 kubelet[2100]: I0510 01:01:07.136394 2100 state_mem.go:35] "Initializing new in-memory state store" May 10 01:01:07.136570 kubelet[2100]: I0510 01:01:07.136563 2100 state_mem.go:75] "Updated machine memory state" May 10 01:01:07.139024 kubelet[2100]: I0510 01:01:07.139002 2100 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 01:01:07.137000 audit[2100]: AVC avc: denied { mac_admin } for pid=2100 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:07.137000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 01:01:07.137000 audit[2100]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cc2450 a1=c0009ef5f0 a2=c000cc2420 a3=25 items=0 ppid=1 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:07.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 01:01:07.139243 kubelet[2100]: I0510 01:01:07.139044 2100 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 01:01:07.139243 kubelet[2100]: I0510 01:01:07.139126 2100 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 01:01:07.139243 kubelet[2100]: I0510 01:01:07.139132 2100 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 01:01:07.141636 kubelet[2100]: I0510 01:01:07.139337 2100 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 01:01:07.180036 kubelet[2100]: E0510 01:01:07.180019 2100 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 10 01:01:07.251125 kubelet[2100]: I0510 01:01:07.250079 2100 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 10 01:01:07.256307 kubelet[2100]: I0510 01:01:07.256295 2100 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 10 01:01:07.256373 kubelet[2100]: I0510 01:01:07.256333 2100 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 10 01:01:07.374442 kubelet[2100]: I0510 01:01:07.374424 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:07.374572 kubelet[2100]: I0510 01:01:07.374561 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:07.374636 kubelet[2100]: I0510 01:01:07.374628 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/017255a87213f5d73e40f36ac53d7ca5-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"017255a87213f5d73e40f36ac53d7ca5\") " pod="kube-system/kube-apiserver-localhost" May 10 01:01:07.374696 kubelet[2100]: I0510 01:01:07.374679 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/017255a87213f5d73e40f36ac53d7ca5-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"017255a87213f5d73e40f36ac53d7ca5\") " pod="kube-system/kube-apiserver-localhost" May 10 01:01:07.374795 kubelet[2100]: I0510 01:01:07.374787 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:07.374857 kubelet[2100]: I0510 01:01:07.374849 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:07.374906 kubelet[2100]: I0510 01:01:07.374898 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 10 01:01:07.374981 kubelet[2100]: I0510 01:01:07.374957 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/017255a87213f5d73e40f36ac53d7ca5-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"017255a87213f5d73e40f36ac53d7ca5\") " pod="kube-system/kube-apiserver-localhost" May 10 01:01:07.375055 kubelet[2100]: I0510 01:01:07.375047 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 10 01:01:07.945000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:07.945000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000748c80 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:01:07.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:01:07.948000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:07.948000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000749180 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:01:07.948000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:01:07.948000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:07.948000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000749340 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:01:07.948000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:01:07.949000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:01:07.949000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000db76a0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:01:07.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:01:08.051626 kubelet[2100]: I0510 01:01:08.051607 2100 apiserver.go:52] "Watching apiserver" May 10 01:01:08.073778 kubelet[2100]: I0510 01:01:08.073755 2100 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 01:01:08.204115 kubelet[2100]: E0510 01:01:08.204050 2100 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 10 01:01:08.238052 kubelet[2100]: I0510 01:01:08.238017 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.238006247 podStartE2EDuration="3.238006247s" podCreationTimestamp="2025-05-10 01:01:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:01:08.23509167 +0000 UTC m=+1.267062260" watchObservedRunningTime="2025-05-10 01:01:08.238006247 +0000 UTC m=+1.269976831" May 10 01:01:08.238244 kubelet[2100]: I0510 01:01:08.238227 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.238221402 podStartE2EDuration="1.238221402s" podCreationTimestamp="2025-05-10 01:01:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:01:08.212249645 +0000 UTC m=+1.244220236" watchObservedRunningTime="2025-05-10 01:01:08.238221402 +0000 UTC m=+1.270191980" May 10 01:01:08.285549 kubelet[2100]: I0510 01:01:08.285520 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.285507297 podStartE2EDuration="1.285507297s" podCreationTimestamp="2025-05-10 01:01:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:01:08.268038206 +0000 UTC m=+1.300008792" watchObservedRunningTime="2025-05-10 01:01:08.285507297 +0000 UTC m=+1.317477881" May 10 01:01:08.682000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7331 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 01:01:08.682000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dc0440 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:01:08.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:01:10.779260 sudo[1469]: pam_unix(sudo:session): session closed for user root May 10 01:01:10.778000 audit[1469]: USER_END pid=1469 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:01:10.778000 audit[1469]: CRED_DISP pid=1469 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 01:01:10.781767 sshd[1465]: pam_unix(sshd:session): session closed for user core May 10 01:01:10.781000 audit[1465]: USER_END pid=1465 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:01:10.781000 audit[1465]: CRED_DISP pid=1465 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:01:10.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-139.178.89.65:43322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:01:10.783404 systemd[1]: sshd@6-139.178.70.100:22-139.178.89.65:43322.service: Deactivated successfully. May 10 01:01:10.783814 systemd[1]: session-9.scope: Deactivated successfully. May 10 01:01:10.783912 systemd[1]: session-9.scope: Consumed 2.729s CPU time. May 10 01:01:10.784824 systemd-logind[1241]: Session 9 logged out. Waiting for processes to exit. May 10 01:01:10.785709 systemd-logind[1241]: Removed session 9. May 10 01:01:11.330269 kubelet[2100]: I0510 01:01:11.330245 2100 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 01:01:11.330511 env[1248]: time="2025-05-10T01:01:11.330439361Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 01:01:11.330780 kubelet[2100]: I0510 01:01:11.330770 2100 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 01:01:12.094182 systemd[1]: Created slice kubepods-besteffort-pod32e09085_8548_4c7a_8e79_c43ae92765f4.slice. May 10 01:01:12.106601 kubelet[2100]: I0510 01:01:12.106575 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/32e09085-8548-4c7a-8e79-c43ae92765f4-kube-proxy\") pod \"kube-proxy-fwjn2\" (UID: \"32e09085-8548-4c7a-8e79-c43ae92765f4\") " pod="kube-system/kube-proxy-fwjn2" May 10 01:01:12.106601 kubelet[2100]: I0510 01:01:12.106598 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mf2b5\" (UniqueName: \"kubernetes.io/projected/32e09085-8548-4c7a-8e79-c43ae92765f4-kube-api-access-mf2b5\") pod \"kube-proxy-fwjn2\" (UID: \"32e09085-8548-4c7a-8e79-c43ae92765f4\") " pod="kube-system/kube-proxy-fwjn2" May 10 01:01:12.106746 kubelet[2100]: I0510 01:01:12.106616 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/32e09085-8548-4c7a-8e79-c43ae92765f4-lib-modules\") pod \"kube-proxy-fwjn2\" (UID: \"32e09085-8548-4c7a-8e79-c43ae92765f4\") " pod="kube-system/kube-proxy-fwjn2" May 10 01:01:12.106746 kubelet[2100]: I0510 01:01:12.106626 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/32e09085-8548-4c7a-8e79-c43ae92765f4-xtables-lock\") pod \"kube-proxy-fwjn2\" (UID: \"32e09085-8548-4c7a-8e79-c43ae92765f4\") " pod="kube-system/kube-proxy-fwjn2" May 10 01:01:12.217319 kubelet[2100]: I0510 01:01:12.217291 2100 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 01:01:12.401080 env[1248]: time="2025-05-10T01:01:12.400991200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fwjn2,Uid:32e09085-8548-4c7a-8e79-c43ae92765f4,Namespace:kube-system,Attempt:0,}" May 10 01:01:12.412501 env[1248]: time="2025-05-10T01:01:12.412457801Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:01:12.412605 env[1248]: time="2025-05-10T01:01:12.412508171Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:01:12.412605 env[1248]: time="2025-05-10T01:01:12.412532154Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:01:12.415439 env[1248]: time="2025-05-10T01:01:12.412712418Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3ef10470fd55ff003fd047bc45f379ae7020624d17221ef168258e78cffb042 pid=2179 runtime=io.containerd.runc.v2 May 10 01:01:12.424647 systemd[1]: run-containerd-runc-k8s.io-a3ef10470fd55ff003fd047bc45f379ae7020624d17221ef168258e78cffb042-runc.STy4aq.mount: Deactivated successfully. May 10 01:01:12.440462 systemd[1]: Created slice kubepods-besteffort-pod524d2759_eacf_4142_9803_86ac3ea4d31c.slice. May 10 01:01:12.446213 systemd[1]: Started cri-containerd-a3ef10470fd55ff003fd047bc45f379ae7020624d17221ef168258e78cffb042.scope. May 10 01:01:12.462529 kernel: kauditd_printk_skb: 272 callbacks suppressed May 10 01:01:12.462649 kernel: audit: type=1400 audit(1746838872.453:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.462677 kernel: audit: type=1400 audit(1746838872.453:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.462694 kernel: audit: type=1400 audit(1746838872.453:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.465303 kernel: audit: type=1400 audit(1746838872.453:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.470227 kernel: audit: type=1400 audit(1746838872.453:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.470259 kernel: audit: type=1400 audit(1746838872.453:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.470274 kernel: audit: type=1400 audit(1746838872.453:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.475198 kernel: audit: type=1400 audit(1746838872.453:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.475230 kernel: audit: type=1400 audit(1746838872.453:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.480568 kernel: audit: type=1400 audit(1746838872.456:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit: BPF prog-id=103 op=LOAD May 10 01:01:12.456000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2179 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656631303437306664353566663030336664303437626334356633 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2179 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656631303437306664353566663030336664303437626334356633 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.456000 audit: BPF prog-id=104 op=LOAD May 10 01:01:12.456000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002dbff0 items=0 ppid=2179 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656631303437306664353566663030336664303437626334356633 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.458000 audit: BPF prog-id=105 op=LOAD May 10 01:01:12.458000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000340038 items=0 ppid=2179 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656631303437306664353566663030336664303437626334356633 May 10 01:01:12.461000 audit: BPF prog-id=105 op=UNLOAD May 10 01:01:12.461000 audit: BPF prog-id=104 op=UNLOAD May 10 01:01:12.461000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.461000 audit: BPF prog-id=106 op=LOAD May 10 01:01:12.461000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000340448 items=0 ppid=2179 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656631303437306664353566663030336664303437626334356633 May 10 01:01:12.486647 env[1248]: time="2025-05-10T01:01:12.486619481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fwjn2,Uid:32e09085-8548-4c7a-8e79-c43ae92765f4,Namespace:kube-system,Attempt:0,} returns sandbox id \"a3ef10470fd55ff003fd047bc45f379ae7020624d17221ef168258e78cffb042\"" May 10 01:01:12.488915 env[1248]: time="2025-05-10T01:01:12.488890685Z" level=info msg="CreateContainer within sandbox \"a3ef10470fd55ff003fd047bc45f379ae7020624d17221ef168258e78cffb042\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 01:01:12.509684 kubelet[2100]: I0510 01:01:12.509607 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l68k4\" (UniqueName: \"kubernetes.io/projected/524d2759-eacf-4142-9803-86ac3ea4d31c-kube-api-access-l68k4\") pod \"tigera-operator-6f6897fdc5-ltqxq\" (UID: \"524d2759-eacf-4142-9803-86ac3ea4d31c\") " pod="tigera-operator/tigera-operator-6f6897fdc5-ltqxq" May 10 01:01:12.509903 kubelet[2100]: I0510 01:01:12.509691 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/524d2759-eacf-4142-9803-86ac3ea4d31c-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-ltqxq\" (UID: \"524d2759-eacf-4142-9803-86ac3ea4d31c\") " pod="tigera-operator/tigera-operator-6f6897fdc5-ltqxq" May 10 01:01:12.535526 env[1248]: time="2025-05-10T01:01:12.535493838Z" level=info msg="CreateContainer within sandbox \"a3ef10470fd55ff003fd047bc45f379ae7020624d17221ef168258e78cffb042\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"217e1ab0971aabe82966f31c9d562fbf95fba000f880bbb6e88cac5d70a732e5\"" May 10 01:01:12.536302 env[1248]: time="2025-05-10T01:01:12.536269051Z" level=info msg="StartContainer for \"217e1ab0971aabe82966f31c9d562fbf95fba000f880bbb6e88cac5d70a732e5\"" May 10 01:01:12.549911 systemd[1]: Started cri-containerd-217e1ab0971aabe82966f31c9d562fbf95fba000f880bbb6e88cac5d70a732e5.scope. May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f81406ed8d8 items=0 ppid=2179 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376531616230393731616162653832393636663331633964353632 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit: BPF prog-id=107 op=LOAD May 10 01:01:12.559000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000298208 items=0 ppid=2179 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376531616230393731616162653832393636663331633964353632 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit: BPF prog-id=108 op=LOAD May 10 01:01:12.559000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000298258 items=0 ppid=2179 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376531616230393731616162653832393636663331633964353632 May 10 01:01:12.559000 audit: BPF prog-id=108 op=UNLOAD May 10 01:01:12.559000 audit: BPF prog-id=107 op=UNLOAD May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { perfmon } for pid=2221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.559000 audit: BPF prog-id=109 op=LOAD May 10 01:01:12.559000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002982e8 items=0 ppid=2179 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376531616230393731616162653832393636663331633964353632 May 10 01:01:12.568637 env[1248]: time="2025-05-10T01:01:12.568614924Z" level=info msg="StartContainer for \"217e1ab0971aabe82966f31c9d562fbf95fba000f880bbb6e88cac5d70a732e5\" returns successfully" May 10 01:01:12.748387 env[1248]: time="2025-05-10T01:01:12.748316159Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-ltqxq,Uid:524d2759-eacf-4142-9803-86ac3ea4d31c,Namespace:tigera-operator,Attempt:0,}" May 10 01:01:12.756437 env[1248]: time="2025-05-10T01:01:12.756403041Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:01:12.756557 env[1248]: time="2025-05-10T01:01:12.756542069Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:01:12.756649 env[1248]: time="2025-05-10T01:01:12.756625668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:01:12.756897 env[1248]: time="2025-05-10T01:01:12.756856593Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fcf61bd929e055e7e48210949a6c6506995dbff0de11c7d9fb44949c5793daf6 pid=2256 runtime=io.containerd.runc.v2 May 10 01:01:12.765228 systemd[1]: Started cri-containerd-fcf61bd929e055e7e48210949a6c6506995dbff0de11c7d9fb44949c5793daf6.scope. May 10 01:01:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.775000 audit: BPF prog-id=110 op=LOAD May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2256 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663631626439323965303535653765343832313039343961366336 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2256 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663631626439323965303535653765343832313039343961366336 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit: BPF prog-id=111 op=LOAD May 10 01:01:12.776000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001dfad0 items=0 ppid=2256 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663631626439323965303535653765343832313039343961366336 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit: BPF prog-id=112 op=LOAD May 10 01:01:12.776000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001dfb18 items=0 ppid=2256 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663631626439323965303535653765343832313039343961366336 May 10 01:01:12.776000 audit: BPF prog-id=112 op=UNLOAD May 10 01:01:12.776000 audit: BPF prog-id=111 op=UNLOAD May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:12.776000 audit: BPF prog-id=113 op=LOAD May 10 01:01:12.776000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001dff28 items=0 ppid=2256 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:12.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663631626439323965303535653765343832313039343961366336 May 10 01:01:12.797846 env[1248]: time="2025-05-10T01:01:12.797821749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-ltqxq,Uid:524d2759-eacf-4142-9803-86ac3ea4d31c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"fcf61bd929e055e7e48210949a6c6506995dbff0de11c7d9fb44949c5793daf6\"" May 10 01:01:12.800126 env[1248]: time="2025-05-10T01:01:12.800105595Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 01:01:13.215000 audit[2324]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.215000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef7000110 a2=0 a3=7ffef70000fc items=0 ppid=2232 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 01:01:13.215000 audit[2325]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.215000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe5867d00 a2=0 a3=7fffe5867cec items=0 ppid=2232 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 01:01:13.216000 audit[2326]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.216000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9ea9c490 a2=0 a3=7fff9ea9c47c items=0 ppid=2232 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 01:01:13.217000 audit[2327]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.217000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb3d8a090 a2=0 a3=7ffdb3d8a07c items=0 ppid=2232 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 01:01:13.219000 audit[2328]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.219000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2cff5570 a2=0 a3=7ffd2cff555c items=0 ppid=2232 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 01:01:13.219000 audit[2329]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.219000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed1b11f80 a2=0 a3=7ffed1b11f6c items=0 ppid=2232 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 01:01:13.322000 audit[2330]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.322000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc6b598080 a2=0 a3=7ffc6b59806c items=0 ppid=2232 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 01:01:13.325000 audit[2332]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.325000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc8b245010 a2=0 a3=7ffc8b244ffc items=0 ppid=2232 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.325000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 01:01:13.329000 audit[2335]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.329000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc684e0fb0 a2=0 a3=7ffc684e0f9c items=0 ppid=2232 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 01:01:13.330000 audit[2336]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.330000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfd36b4e0 a2=0 a3=7ffdfd36b4cc items=0 ppid=2232 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 01:01:13.332000 audit[2338]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.332000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd64c21c0 a2=0 a3=7ffdd64c21ac items=0 ppid=2232 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 01:01:13.333000 audit[2339]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.333000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef9b51500 a2=0 a3=7ffef9b514ec items=0 ppid=2232 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 01:01:13.335000 audit[2341]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.335000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc1304e000 a2=0 a3=7ffc1304dfec items=0 ppid=2232 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 01:01:13.338000 audit[2344]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.338000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffdbbc6610 a2=0 a3=7fffdbbc65fc items=0 ppid=2232 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 01:01:13.339000 audit[2345]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.339000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb6a65940 a2=0 a3=7ffeb6a6592c items=0 ppid=2232 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 01:01:13.341000 audit[2347]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.341000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeab4c4e60 a2=0 a3=7ffeab4c4e4c items=0 ppid=2232 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 01:01:13.342000 audit[2348]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.342000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffeeb0da50 a2=0 a3=7fffeeb0da3c items=0 ppid=2232 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 01:01:13.344000 audit[2350]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.344000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0fabed60 a2=0 a3=7ffe0fabed4c items=0 ppid=2232 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 01:01:13.347000 audit[2353]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.347000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee175d8c0 a2=0 a3=7ffee175d8ac items=0 ppid=2232 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 01:01:13.350000 audit[2356]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.350000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb146ed00 a2=0 a3=7ffcb146ecec items=0 ppid=2232 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 01:01:13.350000 audit[2357]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.350000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff36c667f0 a2=0 a3=7fff36c667dc items=0 ppid=2232 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 01:01:13.352000 audit[2359]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.352000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd349fa740 a2=0 a3=7ffd349fa72c items=0 ppid=2232 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 01:01:13.355000 audit[2362]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.355000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3b541230 a2=0 a3=7ffd3b54121c items=0 ppid=2232 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 01:01:13.355000 audit[2363]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.355000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc23666620 a2=0 a3=7ffc2366660c items=0 ppid=2232 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 01:01:13.357000 audit[2365]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 01:01:13.357000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffffe13e980 a2=0 a3=7ffffe13e96c items=0 ppid=2232 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 01:01:13.375000 audit[2371]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:13.375000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd20981f10 a2=0 a3=7ffd20981efc items=0 ppid=2232 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:13.387000 audit[2371]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:13.387000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd20981f10 a2=0 a3=7ffd20981efc items=0 ppid=2232 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:13.388000 audit[2376]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.388000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe4dad8080 a2=0 a3=7ffe4dad806c items=0 ppid=2232 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 01:01:13.390000 audit[2378]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.390000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe322cf880 a2=0 a3=7ffe322cf86c items=0 ppid=2232 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 01:01:13.393000 audit[2381]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.393000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc93ec7120 a2=0 a3=7ffc93ec710c items=0 ppid=2232 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 01:01:13.393000 audit[2382]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.393000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe7eb6de0 a2=0 a3=7fffe7eb6dcc items=0 ppid=2232 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 01:01:13.395000 audit[2384]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.395000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5f3204c0 a2=0 a3=7ffc5f3204ac items=0 ppid=2232 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 01:01:13.395000 audit[2385]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.395000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea743bd90 a2=0 a3=7ffea743bd7c items=0 ppid=2232 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 01:01:13.397000 audit[2387]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.397000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffce5d4620 a2=0 a3=7fffce5d460c items=0 ppid=2232 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 01:01:13.399000 audit[2390]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.399000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc6da740b0 a2=0 a3=7ffc6da7409c items=0 ppid=2232 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 01:01:13.400000 audit[2391]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.400000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed473fb50 a2=0 a3=7ffed473fb3c items=0 ppid=2232 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 01:01:13.402000 audit[2393]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.402000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb4858ae0 a2=0 a3=7fffb4858acc items=0 ppid=2232 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 01:01:13.403000 audit[2394]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.403000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8ae3a610 a2=0 a3=7fff8ae3a5fc items=0 ppid=2232 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 01:01:13.404000 audit[2396]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.404000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd02248f90 a2=0 a3=7ffd02248f7c items=0 ppid=2232 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 01:01:13.406000 audit[2399]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.406000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5431a460 a2=0 a3=7ffc5431a44c items=0 ppid=2232 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 01:01:13.409000 audit[2402]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.409000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe3882130 a2=0 a3=7fffe388211c items=0 ppid=2232 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 01:01:13.410000 audit[2403]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.410000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc8dd38eb0 a2=0 a3=7ffc8dd38e9c items=0 ppid=2232 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 01:01:13.411000 audit[2405]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.411000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff8a6cc7f0 a2=0 a3=7fff8a6cc7dc items=0 ppid=2232 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 01:01:13.413000 audit[2408]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.413000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffaea2b6e0 a2=0 a3=7fffaea2b6cc items=0 ppid=2232 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 01:01:13.414000 audit[2409]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.414000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc75a34c10 a2=0 a3=7ffc75a34bfc items=0 ppid=2232 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 01:01:13.415000 audit[2411]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.415000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc311d6970 a2=0 a3=7ffc311d695c items=0 ppid=2232 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 01:01:13.416000 audit[2412]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.416000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd411f75a0 a2=0 a3=7ffd411f758c items=0 ppid=2232 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 01:01:13.418000 audit[2414]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.418000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6d5f9de0 a2=0 a3=7ffc6d5f9dcc items=0 ppid=2232 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 01:01:13.420000 audit[2417]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 01:01:13.420000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd46c25870 a2=0 a3=7ffd46c2585c items=0 ppid=2232 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 01:01:13.421000 audit[2419]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 01:01:13.421000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff492a6aa0 a2=0 a3=7fff492a6a8c items=0 ppid=2232 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.421000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:13.421000 audit[2419]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 01:01:13.421000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff492a6aa0 a2=0 a3=7fff492a6a8c items=0 ppid=2232 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:13.421000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:14.267961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount560379055.mount: Deactivated successfully. May 10 01:01:14.997105 env[1248]: time="2025-05-10T01:01:14.997026020Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:14.998403 env[1248]: time="2025-05-10T01:01:14.998388272Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:14.999635 env[1248]: time="2025-05-10T01:01:14.999614357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:15.000467 env[1248]: time="2025-05-10T01:01:15.000452191Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:15.000878 env[1248]: time="2025-05-10T01:01:15.000862221Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 01:01:15.024145 env[1248]: time="2025-05-10T01:01:15.024114790Z" level=info msg="CreateContainer within sandbox \"fcf61bd929e055e7e48210949a6c6506995dbff0de11c7d9fb44949c5793daf6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 01:01:15.029983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2207474983.mount: Deactivated successfully. May 10 01:01:15.034316 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3587804469.mount: Deactivated successfully. May 10 01:01:15.036081 env[1248]: time="2025-05-10T01:01:15.036054116Z" level=info msg="CreateContainer within sandbox \"fcf61bd929e055e7e48210949a6c6506995dbff0de11c7d9fb44949c5793daf6\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"d993a385ba9d8d370f080f1e8f6f9a4bcbedb975945cecd83f0274da9117a978\"" May 10 01:01:15.037220 env[1248]: time="2025-05-10T01:01:15.037199932Z" level=info msg="StartContainer for \"d993a385ba9d8d370f080f1e8f6f9a4bcbedb975945cecd83f0274da9117a978\"" May 10 01:01:15.057874 systemd[1]: Started cri-containerd-d993a385ba9d8d370f080f1e8f6f9a4bcbedb975945cecd83f0274da9117a978.scope. May 10 01:01:15.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.068000 audit: BPF prog-id=114 op=LOAD May 10 01:01:15.069000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2256 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:15.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393361333835626139643864333730663038306631653866366639 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2256 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:15.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393361333835626139643864333730663038306631653866366639 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.069000 audit: BPF prog-id=115 op=LOAD May 10 01:01:15.069000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0000243a0 items=0 ppid=2256 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:15.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393361333835626139643864333730663038306631653866366639 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit: BPF prog-id=116 op=LOAD May 10 01:01:15.070000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0000243e8 items=0 ppid=2256 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:15.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393361333835626139643864333730663038306631653866366639 May 10 01:01:15.070000 audit: BPF prog-id=116 op=UNLOAD May 10 01:01:15.070000 audit: BPF prog-id=115 op=UNLOAD May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { perfmon } for pid=2428 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit[2428]: AVC avc: denied { bpf } for pid=2428 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:15.070000 audit: BPF prog-id=117 op=LOAD May 10 01:01:15.070000 audit[2428]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0000247f8 items=0 ppid=2256 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:15.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393361333835626139643864333730663038306631653866366639 May 10 01:01:15.088444 env[1248]: time="2025-05-10T01:01:15.088373145Z" level=info msg="StartContainer for \"d993a385ba9d8d370f080f1e8f6f9a4bcbedb975945cecd83f0274da9117a978\" returns successfully" May 10 01:01:15.162753 kubelet[2100]: I0510 01:01:15.161111 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fwjn2" podStartSLOduration=3.161098069 podStartE2EDuration="3.161098069s" podCreationTimestamp="2025-05-10 01:01:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:01:13.148260327 +0000 UTC m=+6.180230919" watchObservedRunningTime="2025-05-10 01:01:15.161098069 +0000 UTC m=+8.193068654" May 10 01:01:15.162753 kubelet[2100]: I0510 01:01:15.161201 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-ltqxq" podStartSLOduration=0.953960849 podStartE2EDuration="3.161196371s" podCreationTimestamp="2025-05-10 01:01:12 +0000 UTC" firstStartedPulling="2025-05-10 01:01:12.798508448 +0000 UTC m=+5.830479027" lastFinishedPulling="2025-05-10 01:01:15.005743971 +0000 UTC m=+8.037714549" observedRunningTime="2025-05-10 01:01:15.160490676 +0000 UTC m=+8.192461266" watchObservedRunningTime="2025-05-10 01:01:15.161196371 +0000 UTC m=+8.193166961" May 10 01:01:17.716744 kernel: kauditd_printk_skb: 357 callbacks suppressed May 10 01:01:17.716839 kernel: audit: type=1325 audit(1746838877.712:910): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:17.712000 audit[2462]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:17.721327 kernel: audit: type=1300 audit(1746838877.712:910): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffe4021a40 a2=0 a3=7fffe4021a2c items=0 ppid=2232 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:17.712000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffe4021a40 a2=0 a3=7fffe4021a2c items=0 ppid=2232 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:17.712000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:17.725650 kernel: audit: type=1327 audit(1746838877.712:910): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:17.725732 kernel: audit: type=1325 audit(1746838877.720:911): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:17.720000 audit[2462]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:17.729638 kernel: audit: type=1300 audit(1746838877.720:911): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe4021a40 a2=0 a3=0 items=0 ppid=2232 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:17.729679 kernel: audit: type=1327 audit(1746838877.720:911): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:17.720000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe4021a40 a2=0 a3=0 items=0 ppid=2232 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:17.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:17.734000 audit[2464]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:17.734000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe83990fd0 a2=0 a3=7ffe83990fbc items=0 ppid=2232 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:17.741369 kernel: audit: type=1325 audit(1746838877.734:912): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:17.741410 kernel: audit: type=1300 audit(1746838877.734:912): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe83990fd0 a2=0 a3=7ffe83990fbc items=0 ppid=2232 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:17.741428 kernel: audit: type=1327 audit(1746838877.734:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:17.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:17.742000 audit[2464]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:17.742000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe83990fd0 a2=0 a3=0 items=0 ppid=2232 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:17.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:17.746306 kernel: audit: type=1325 audit(1746838877.742:913): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:17.855145 systemd[1]: Created slice kubepods-besteffort-pod2ce3f9a5_d5c9_407a_8de2_45cd68178c55.slice. May 10 01:01:17.915065 systemd[1]: Created slice kubepods-besteffort-pod76aee3d8_2662_4b23_a26f_5cebe012bd82.slice. May 10 01:01:17.960500 kubelet[2100]: I0510 01:01:17.960477 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-584kq\" (UniqueName: \"kubernetes.io/projected/2ce3f9a5-d5c9-407a-8de2-45cd68178c55-kube-api-access-584kq\") pod \"calico-typha-658ff46f98-5t8zb\" (UID: \"2ce3f9a5-d5c9-407a-8de2-45cd68178c55\") " pod="calico-system/calico-typha-658ff46f98-5t8zb" May 10 01:01:17.960803 kubelet[2100]: I0510 01:01:17.960792 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2ce3f9a5-d5c9-407a-8de2-45cd68178c55-tigera-ca-bundle\") pod \"calico-typha-658ff46f98-5t8zb\" (UID: \"2ce3f9a5-d5c9-407a-8de2-45cd68178c55\") " pod="calico-system/calico-typha-658ff46f98-5t8zb" May 10 01:01:17.960875 kubelet[2100]: I0510 01:01:17.960865 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2ce3f9a5-d5c9-407a-8de2-45cd68178c55-typha-certs\") pod \"calico-typha-658ff46f98-5t8zb\" (UID: \"2ce3f9a5-d5c9-407a-8de2-45cd68178c55\") " pod="calico-system/calico-typha-658ff46f98-5t8zb" May 10 01:01:18.059279 kubelet[2100]: E0510 01:01:18.059246 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:18.061876 kubelet[2100]: I0510 01:01:18.061862 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-policysync\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.061970 kubelet[2100]: I0510 01:01:18.061960 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-lib-modules\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.062028 kubelet[2100]: I0510 01:01:18.062019 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/76aee3d8-2662-4b23-a26f-5cebe012bd82-tigera-ca-bundle\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.062109 kubelet[2100]: I0510 01:01:18.062101 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-bin-dir\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.062170 kubelet[2100]: I0510 01:01:18.062162 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-var-lib-calico\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.062248 kubelet[2100]: I0510 01:01:18.062236 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-flexvol-driver-host\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.062784 kubelet[2100]: I0510 01:01:18.062774 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whk6m\" (UniqueName: \"kubernetes.io/projected/76aee3d8-2662-4b23-a26f-5cebe012bd82-kube-api-access-whk6m\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.062854 kubelet[2100]: I0510 01:01:18.062845 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-xtables-lock\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.062910 kubelet[2100]: I0510 01:01:18.062900 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-var-run-calico\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.062964 kubelet[2100]: I0510 01:01:18.062955 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-log-dir\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.063026 kubelet[2100]: I0510 01:01:18.063017 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/76aee3d8-2662-4b23-a26f-5cebe012bd82-node-certs\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.063077 kubelet[2100]: I0510 01:01:18.063068 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-net-dir\") pod \"calico-node-4gx8r\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " pod="calico-system/calico-node-4gx8r" May 10 01:01:18.157659 env[1248]: time="2025-05-10T01:01:18.157334267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-658ff46f98-5t8zb,Uid:2ce3f9a5-d5c9-407a-8de2-45cd68178c55,Namespace:calico-system,Attempt:0,}" May 10 01:01:18.163954 kubelet[2100]: I0510 01:01:18.163925 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/496dec10-f9bd-4cc8-9fbd-5feb996d9abc-kubelet-dir\") pod \"csi-node-driver-9qdlp\" (UID: \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\") " pod="calico-system/csi-node-driver-9qdlp" May 10 01:01:18.164041 kubelet[2100]: I0510 01:01:18.163988 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zd7cf\" (UniqueName: \"kubernetes.io/projected/496dec10-f9bd-4cc8-9fbd-5feb996d9abc-kube-api-access-zd7cf\") pod \"csi-node-driver-9qdlp\" (UID: \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\") " pod="calico-system/csi-node-driver-9qdlp" May 10 01:01:18.164041 kubelet[2100]: I0510 01:01:18.164009 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/496dec10-f9bd-4cc8-9fbd-5feb996d9abc-varrun\") pod \"csi-node-driver-9qdlp\" (UID: \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\") " pod="calico-system/csi-node-driver-9qdlp" May 10 01:01:18.164041 kubelet[2100]: I0510 01:01:18.164025 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/496dec10-f9bd-4cc8-9fbd-5feb996d9abc-registration-dir\") pod \"csi-node-driver-9qdlp\" (UID: \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\") " pod="calico-system/csi-node-driver-9qdlp" May 10 01:01:18.164135 kubelet[2100]: I0510 01:01:18.164057 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/496dec10-f9bd-4cc8-9fbd-5feb996d9abc-socket-dir\") pod \"csi-node-driver-9qdlp\" (UID: \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\") " pod="calico-system/csi-node-driver-9qdlp" May 10 01:01:18.165137 kubelet[2100]: E0510 01:01:18.165120 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.165137 kubelet[2100]: W0510 01:01:18.165131 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.165206 kubelet[2100]: E0510 01:01:18.165148 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.165240 kubelet[2100]: E0510 01:01:18.165231 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.165240 kubelet[2100]: W0510 01:01:18.165238 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.165370 kubelet[2100]: E0510 01:01:18.165243 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.168330 env[1248]: time="2025-05-10T01:01:18.167828256Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:01:18.168330 env[1248]: time="2025-05-10T01:01:18.167851635Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:01:18.168330 env[1248]: time="2025-05-10T01:01:18.167858507Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:01:18.168330 env[1248]: time="2025-05-10T01:01:18.167941593Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8e8814102a8504d6d7a6e5bd81d48b1486c65b4a4ed6daea29a1c278af9263d0 pid=2477 runtime=io.containerd.runc.v2 May 10 01:01:18.171479 kubelet[2100]: E0510 01:01:18.170410 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.171479 kubelet[2100]: W0510 01:01:18.170425 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.171479 kubelet[2100]: E0510 01:01:18.170448 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.172049 kubelet[2100]: E0510 01:01:18.172037 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.172049 kubelet[2100]: W0510 01:01:18.172045 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.172111 kubelet[2100]: E0510 01:01:18.172054 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.172158 kubelet[2100]: E0510 01:01:18.172148 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.172158 kubelet[2100]: W0510 01:01:18.172155 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.172211 kubelet[2100]: E0510 01:01:18.172161 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.172234 kubelet[2100]: E0510 01:01:18.172230 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.172255 kubelet[2100]: W0510 01:01:18.172235 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.172255 kubelet[2100]: E0510 01:01:18.172240 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.172354 kubelet[2100]: E0510 01:01:18.172343 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.172354 kubelet[2100]: W0510 01:01:18.172351 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.172424 kubelet[2100]: E0510 01:01:18.172356 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.177869 kubelet[2100]: E0510 01:01:18.177852 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.178044 kubelet[2100]: W0510 01:01:18.178032 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.178105 kubelet[2100]: E0510 01:01:18.178095 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.179226 kubelet[2100]: E0510 01:01:18.179218 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.179309 kubelet[2100]: W0510 01:01:18.179300 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.179372 kubelet[2100]: E0510 01:01:18.179357 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.179511 kubelet[2100]: E0510 01:01:18.179504 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.179565 kubelet[2100]: W0510 01:01:18.179551 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.179616 kubelet[2100]: E0510 01:01:18.179608 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.179752 kubelet[2100]: E0510 01:01:18.179745 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.179820 kubelet[2100]: W0510 01:01:18.179809 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.179889 kubelet[2100]: E0510 01:01:18.179870 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.180062 kubelet[2100]: E0510 01:01:18.180055 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.180119 kubelet[2100]: W0510 01:01:18.180111 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.180165 kubelet[2100]: E0510 01:01:18.180157 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.181839 kubelet[2100]: E0510 01:01:18.181657 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.181839 kubelet[2100]: W0510 01:01:18.181668 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.181839 kubelet[2100]: E0510 01:01:18.181679 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.189634 systemd[1]: Started cri-containerd-8e8814102a8504d6d7a6e5bd81d48b1486c65b4a4ed6daea29a1c278af9263d0.scope. May 10 01:01:18.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit: BPF prog-id=118 op=LOAD May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2477 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865383831343130326138353034643664376136653562643831643438 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2477 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865383831343130326138353034643664376136653562643831643438 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit: BPF prog-id=119 op=LOAD May 10 01:01:18.205000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a5a50 items=0 ppid=2477 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865383831343130326138353034643664376136653562643831643438 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.205000 audit: BPF prog-id=120 op=LOAD May 10 01:01:18.205000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a5a98 items=0 ppid=2477 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865383831343130326138353034643664376136653562643831643438 May 10 01:01:18.206000 audit: BPF prog-id=120 op=UNLOAD May 10 01:01:18.206000 audit: BPF prog-id=119 op=UNLOAD May 10 01:01:18.206000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { perfmon } for pid=2493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit[2493]: AVC avc: denied { bpf } for pid=2493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.206000 audit: BPF prog-id=121 op=LOAD May 10 01:01:18.206000 audit[2493]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a5ea8 items=0 ppid=2477 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865383831343130326138353034643664376136653562643831643438 May 10 01:01:18.217990 env[1248]: time="2025-05-10T01:01:18.217966102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4gx8r,Uid:76aee3d8-2662-4b23-a26f-5cebe012bd82,Namespace:calico-system,Attempt:0,}" May 10 01:01:18.225887 env[1248]: time="2025-05-10T01:01:18.225834368Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:01:18.225978 env[1248]: time="2025-05-10T01:01:18.225911901Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:01:18.225978 env[1248]: time="2025-05-10T01:01:18.225930217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:01:18.226559 env[1248]: time="2025-05-10T01:01:18.226524217Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43 pid=2522 runtime=io.containerd.runc.v2 May 10 01:01:18.236682 systemd[1]: Started cri-containerd-f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43.scope. May 10 01:01:18.238509 env[1248]: time="2025-05-10T01:01:18.238488776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-658ff46f98-5t8zb,Uid:2ce3f9a5-d5c9-407a-8de2-45cd68178c55,Namespace:calico-system,Attempt:0,} returns sandbox id \"8e8814102a8504d6d7a6e5bd81d48b1486c65b4a4ed6daea29a1c278af9263d0\"" May 10 01:01:18.239422 env[1248]: time="2025-05-10T01:01:18.239408817Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 01:01:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit: BPF prog-id=122 op=LOAD May 10 01:01:18.252000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.252000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2522 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363731666238356461626332383938303133656533326639323033 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2522 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363731666238356461626332383938303133656533326639323033 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit: BPF prog-id=123 op=LOAD May 10 01:01:18.253000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dec40 items=0 ppid=2522 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363731666238356461626332383938303133656533326639323033 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.253000 audit: BPF prog-id=124 op=LOAD May 10 01:01:18.253000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dec88 items=0 ppid=2522 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363731666238356461626332383938303133656533326639323033 May 10 01:01:18.254000 audit: BPF prog-id=124 op=UNLOAD May 10 01:01:18.254000 audit: BPF prog-id=123 op=UNLOAD May 10 01:01:18.254000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:18.254000 audit: BPF prog-id=125 op=LOAD May 10 01:01:18.254000 audit[2532]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001df098 items=0 ppid=2522 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363731666238356461626332383938303133656533326639323033 May 10 01:01:18.264036 env[1248]: time="2025-05-10T01:01:18.264009775Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4gx8r,Uid:76aee3d8-2662-4b23-a26f-5cebe012bd82,Namespace:calico-system,Attempt:0,} returns sandbox id \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\"" May 10 01:01:18.265034 kubelet[2100]: E0510 01:01:18.264430 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.265034 kubelet[2100]: W0510 01:01:18.264441 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.265034 kubelet[2100]: E0510 01:01:18.264453 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.265034 kubelet[2100]: E0510 01:01:18.264554 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.265034 kubelet[2100]: W0510 01:01:18.264558 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.265034 kubelet[2100]: E0510 01:01:18.264569 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.265034 kubelet[2100]: E0510 01:01:18.264666 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.265034 kubelet[2100]: W0510 01:01:18.264672 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.265034 kubelet[2100]: E0510 01:01:18.264682 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.265034 kubelet[2100]: E0510 01:01:18.264785 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.265291 kubelet[2100]: W0510 01:01:18.264790 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.265291 kubelet[2100]: E0510 01:01:18.264804 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.265291 kubelet[2100]: E0510 01:01:18.264895 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.265291 kubelet[2100]: W0510 01:01:18.264901 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.265291 kubelet[2100]: E0510 01:01:18.264916 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.265585 kubelet[2100]: E0510 01:01:18.265421 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.265585 kubelet[2100]: W0510 01:01:18.265427 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.265585 kubelet[2100]: E0510 01:01:18.265435 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.265585 kubelet[2100]: E0510 01:01:18.265527 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.265585 kubelet[2100]: W0510 01:01:18.265537 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.265585 kubelet[2100]: E0510 01:01:18.265543 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.265886 kubelet[2100]: E0510 01:01:18.265797 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.265886 kubelet[2100]: W0510 01:01:18.265802 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.265886 kubelet[2100]: E0510 01:01:18.265812 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.266161 kubelet[2100]: E0510 01:01:18.266003 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.266161 kubelet[2100]: W0510 01:01:18.266009 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.266161 kubelet[2100]: E0510 01:01:18.266051 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.266161 kubelet[2100]: E0510 01:01:18.266099 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.266161 kubelet[2100]: W0510 01:01:18.266103 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.266161 kubelet[2100]: E0510 01:01:18.266144 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.266423 kubelet[2100]: E0510 01:01:18.266341 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.266423 kubelet[2100]: W0510 01:01:18.266347 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.266423 kubelet[2100]: E0510 01:01:18.266403 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.266619 kubelet[2100]: E0510 01:01:18.266554 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.266619 kubelet[2100]: W0510 01:01:18.266561 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.266619 kubelet[2100]: E0510 01:01:18.266600 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.266786 kubelet[2100]: E0510 01:01:18.266726 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.266786 kubelet[2100]: W0510 01:01:18.266732 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.266786 kubelet[2100]: E0510 01:01:18.266768 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.266935 kubelet[2100]: E0510 01:01:18.266884 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.266935 kubelet[2100]: W0510 01:01:18.266889 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.266935 kubelet[2100]: E0510 01:01:18.266896 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.267124 kubelet[2100]: E0510 01:01:18.267043 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.267124 kubelet[2100]: W0510 01:01:18.267049 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.267124 kubelet[2100]: E0510 01:01:18.267055 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.267303 kubelet[2100]: E0510 01:01:18.267234 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.267303 kubelet[2100]: W0510 01:01:18.267240 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.267303 kubelet[2100]: E0510 01:01:18.267247 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.267476 kubelet[2100]: E0510 01:01:18.267416 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.267476 kubelet[2100]: W0510 01:01:18.267422 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.267476 kubelet[2100]: E0510 01:01:18.267429 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.268632 kubelet[2100]: E0510 01:01:18.267609 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.268632 kubelet[2100]: W0510 01:01:18.267614 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.268632 kubelet[2100]: E0510 01:01:18.267621 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.268632 kubelet[2100]: E0510 01:01:18.267748 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.268632 kubelet[2100]: W0510 01:01:18.267753 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.268632 kubelet[2100]: E0510 01:01:18.267758 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.268632 kubelet[2100]: E0510 01:01:18.267980 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.268632 kubelet[2100]: W0510 01:01:18.267985 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.268632 kubelet[2100]: E0510 01:01:18.267992 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.268632 kubelet[2100]: E0510 01:01:18.268077 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.268841 kubelet[2100]: W0510 01:01:18.268082 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.268841 kubelet[2100]: E0510 01:01:18.268092 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.268841 kubelet[2100]: E0510 01:01:18.268235 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.268841 kubelet[2100]: W0510 01:01:18.268240 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.268841 kubelet[2100]: E0510 01:01:18.268280 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.268841 kubelet[2100]: E0510 01:01:18.268372 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.268841 kubelet[2100]: W0510 01:01:18.268376 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.268841 kubelet[2100]: E0510 01:01:18.268381 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.268841 kubelet[2100]: E0510 01:01:18.268468 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.268841 kubelet[2100]: W0510 01:01:18.268473 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.269065 kubelet[2100]: E0510 01:01:18.268479 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.269167 kubelet[2100]: E0510 01:01:18.269141 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.269167 kubelet[2100]: W0510 01:01:18.269147 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.269167 kubelet[2100]: E0510 01:01:18.269154 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.273432 kubelet[2100]: E0510 01:01:18.273418 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:18.273531 kubelet[2100]: W0510 01:01:18.273522 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:18.273595 kubelet[2100]: E0510 01:01:18.273581 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:18.751000 audit[2592]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:18.751000 audit[2592]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcfc4399a0 a2=0 a3=7ffcfc43998c items=0 ppid=2232 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:18.756000 audit[2592]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:18.756000 audit[2592]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcfc4399a0 a2=0 a3=0 items=0 ppid=2232 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:18.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:20.075680 kubelet[2100]: E0510 01:01:20.075436 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:20.627867 env[1248]: time="2025-05-10T01:01:20.627841250Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:20.628947 env[1248]: time="2025-05-10T01:01:20.628933267Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:20.629965 env[1248]: time="2025-05-10T01:01:20.629953335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:20.630912 env[1248]: time="2025-05-10T01:01:20.630898418Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:20.631213 env[1248]: time="2025-05-10T01:01:20.631199179Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 01:01:20.632407 env[1248]: time="2025-05-10T01:01:20.632394489Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 01:01:20.654099 env[1248]: time="2025-05-10T01:01:20.654075970Z" level=info msg="CreateContainer within sandbox \"8e8814102a8504d6d7a6e5bd81d48b1486c65b4a4ed6daea29a1c278af9263d0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 01:01:20.678933 kubelet[2100]: E0510 01:01:20.678910 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:20.678933 kubelet[2100]: W0510 01:01:20.678929 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:20.679036 kubelet[2100]: E0510 01:01:20.678945 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:20.679106 kubelet[2100]: E0510 01:01:20.679077 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:20.679106 kubelet[2100]: W0510 01:01:20.679086 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:20.679106 kubelet[2100]: E0510 01:01:20.679094 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:20.679205 kubelet[2100]: E0510 01:01:20.679200 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:20.679234 kubelet[2100]: W0510 01:01:20.679207 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:20.679234 kubelet[2100]: E0510 01:01:20.679227 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:20.679459 kubelet[2100]: E0510 01:01:20.679442 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:20.679459 kubelet[2100]: W0510 01:01:20.679454 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:20.679537 kubelet[2100]: E0510 01:01:20.679464 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:20.679597 kubelet[2100]: E0510 01:01:20.679583 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:20.679644 kubelet[2100]: W0510 01:01:20.679598 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:20.679644 kubelet[2100]: E0510 01:01:20.679606 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:20.693594 env[1248]: time="2025-05-10T01:01:20.693570404Z" level=info msg="CreateContainer within sandbox \"8e8814102a8504d6d7a6e5bd81d48b1486c65b4a4ed6daea29a1c278af9263d0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"291a05b43a7ded8b34be52fdc70245153fa8bc1c8919f4ecf57a45431eed3a46\"" May 10 01:01:20.694999 env[1248]: time="2025-05-10T01:01:20.693945003Z" level=info msg="StartContainer for \"291a05b43a7ded8b34be52fdc70245153fa8bc1c8919f4ecf57a45431eed3a46\"" May 10 01:01:20.711579 systemd[1]: Started cri-containerd-291a05b43a7ded8b34be52fdc70245153fa8bc1c8919f4ecf57a45431eed3a46.scope. May 10 01:01:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.718000 audit: BPF prog-id=126 op=LOAD May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2477 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:20.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316130356234336137646564386233346265353266646337303234 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2477 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:20.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316130356234336137646564386233346265353266646337303234 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit: BPF prog-id=127 op=LOAD May 10 01:01:20.719000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000382d60 items=0 ppid=2477 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:20.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316130356234336137646564386233346265353266646337303234 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.719000 audit: BPF prog-id=128 op=LOAD May 10 01:01:20.719000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000382da8 items=0 ppid=2477 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:20.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316130356234336137646564386233346265353266646337303234 May 10 01:01:20.720000 audit: BPF prog-id=128 op=UNLOAD May 10 01:01:20.720000 audit: BPF prog-id=127 op=UNLOAD May 10 01:01:20.720000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:20.720000 audit: BPF prog-id=129 op=LOAD May 10 01:01:20.720000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003831b8 items=0 ppid=2477 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:20.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239316130356234336137646564386233346265353266646337303234 May 10 01:01:20.748702 env[1248]: time="2025-05-10T01:01:20.748680035Z" level=info msg="StartContainer for \"291a05b43a7ded8b34be52fdc70245153fa8bc1c8919f4ecf57a45431eed3a46\" returns successfully" May 10 01:01:21.081564 kubelet[2100]: E0510 01:01:21.081546 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.081564 kubelet[2100]: W0510 01:01:21.081556 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.081801 kubelet[2100]: E0510 01:01:21.081568 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.081801 kubelet[2100]: E0510 01:01:21.081689 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.081801 kubelet[2100]: W0510 01:01:21.081694 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.081801 kubelet[2100]: E0510 01:01:21.081699 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.081801 kubelet[2100]: E0510 01:01:21.081778 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.081801 kubelet[2100]: W0510 01:01:21.081783 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.081801 kubelet[2100]: E0510 01:01:21.081788 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.081944 kubelet[2100]: E0510 01:01:21.081866 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.081944 kubelet[2100]: W0510 01:01:21.081872 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.081944 kubelet[2100]: E0510 01:01:21.081877 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082011 kubelet[2100]: E0510 01:01:21.081946 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082011 kubelet[2100]: W0510 01:01:21.081950 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082011 kubelet[2100]: E0510 01:01:21.081955 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082076 kubelet[2100]: E0510 01:01:21.082031 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082076 kubelet[2100]: W0510 01:01:21.082035 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082076 kubelet[2100]: E0510 01:01:21.082039 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082137 kubelet[2100]: E0510 01:01:21.082103 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082137 kubelet[2100]: W0510 01:01:21.082107 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082137 kubelet[2100]: E0510 01:01:21.082111 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082200 kubelet[2100]: E0510 01:01:21.082174 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082200 kubelet[2100]: W0510 01:01:21.082177 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082200 kubelet[2100]: E0510 01:01:21.082181 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082274 kubelet[2100]: E0510 01:01:21.082248 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082274 kubelet[2100]: W0510 01:01:21.082252 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082274 kubelet[2100]: E0510 01:01:21.082257 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082359 kubelet[2100]: E0510 01:01:21.082336 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082359 kubelet[2100]: W0510 01:01:21.082341 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082359 kubelet[2100]: E0510 01:01:21.082348 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082434 kubelet[2100]: E0510 01:01:21.082424 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082434 kubelet[2100]: W0510 01:01:21.082430 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082434 kubelet[2100]: E0510 01:01:21.082435 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082531 kubelet[2100]: E0510 01:01:21.082507 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082531 kubelet[2100]: W0510 01:01:21.082512 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082531 kubelet[2100]: E0510 01:01:21.082516 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082597 kubelet[2100]: E0510 01:01:21.082582 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082597 kubelet[2100]: W0510 01:01:21.082587 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082597 kubelet[2100]: E0510 01:01:21.082593 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082682 kubelet[2100]: E0510 01:01:21.082671 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082682 kubelet[2100]: W0510 01:01:21.082678 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082682 kubelet[2100]: E0510 01:01:21.082682 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082758 kubelet[2100]: E0510 01:01:21.082747 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082758 kubelet[2100]: W0510 01:01:21.082751 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082758 kubelet[2100]: E0510 01:01:21.082755 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082831 kubelet[2100]: E0510 01:01:21.082821 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082831 kubelet[2100]: W0510 01:01:21.082827 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082831 kubelet[2100]: E0510 01:01:21.082831 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.082928 kubelet[2100]: E0510 01:01:21.082911 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.082928 kubelet[2100]: W0510 01:01:21.082917 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.082928 kubelet[2100]: E0510 01:01:21.082922 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.083006 kubelet[2100]: E0510 01:01:21.082986 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.083006 kubelet[2100]: W0510 01:01:21.082991 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.083006 kubelet[2100]: E0510 01:01:21.082996 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.083079 kubelet[2100]: E0510 01:01:21.083068 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.083132 kubelet[2100]: W0510 01:01:21.083081 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.083132 kubelet[2100]: E0510 01:01:21.083086 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.083180 kubelet[2100]: E0510 01:01:21.083158 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.083180 kubelet[2100]: W0510 01:01:21.083162 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.083180 kubelet[2100]: E0510 01:01:21.083166 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.083236 kubelet[2100]: E0510 01:01:21.083234 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.083258 kubelet[2100]: W0510 01:01:21.083238 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.083258 kubelet[2100]: E0510 01:01:21.083242 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.083345 kubelet[2100]: E0510 01:01:21.083334 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.083345 kubelet[2100]: W0510 01:01:21.083342 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.083417 kubelet[2100]: E0510 01:01:21.083348 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.083443 kubelet[2100]: E0510 01:01:21.083421 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.083443 kubelet[2100]: W0510 01:01:21.083425 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.083443 kubelet[2100]: E0510 01:01:21.083430 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.083514 kubelet[2100]: E0510 01:01:21.083502 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.083514 kubelet[2100]: W0510 01:01:21.083508 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.083514 kubelet[2100]: E0510 01:01:21.083513 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.083590 kubelet[2100]: E0510 01:01:21.083581 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.083590 kubelet[2100]: W0510 01:01:21.083586 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.083633 kubelet[2100]: E0510 01:01:21.083593 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.171574 kubelet[2100]: I0510 01:01:21.171256 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-658ff46f98-5t8zb" podStartSLOduration=1.778342442 podStartE2EDuration="4.171244232s" podCreationTimestamp="2025-05-10 01:01:17 +0000 UTC" firstStartedPulling="2025-05-10 01:01:18.239124994 +0000 UTC m=+11.271095573" lastFinishedPulling="2025-05-10 01:01:20.632026781 +0000 UTC m=+13.663997363" observedRunningTime="2025-05-10 01:01:21.170792552 +0000 UTC m=+14.202763149" watchObservedRunningTime="2025-05-10 01:01:21.171244232 +0000 UTC m=+14.203214821" May 10 01:01:21.184355 kubelet[2100]: E0510 01:01:21.184334 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.184355 kubelet[2100]: W0510 01:01:21.184348 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.184494 kubelet[2100]: E0510 01:01:21.184363 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.184494 kubelet[2100]: E0510 01:01:21.184467 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.184494 kubelet[2100]: W0510 01:01:21.184473 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.184494 kubelet[2100]: E0510 01:01:21.184480 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.184603 kubelet[2100]: E0510 01:01:21.184569 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.184603 kubelet[2100]: W0510 01:01:21.184574 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.184603 kubelet[2100]: E0510 01:01:21.184580 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.184682 kubelet[2100]: E0510 01:01:21.184670 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.184682 kubelet[2100]: W0510 01:01:21.184675 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.184682 kubelet[2100]: E0510 01:01:21.184681 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186142 kubelet[2100]: E0510 01:01:21.184772 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186142 kubelet[2100]: W0510 01:01:21.184780 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186142 kubelet[2100]: E0510 01:01:21.184786 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186142 kubelet[2100]: E0510 01:01:21.184873 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186142 kubelet[2100]: W0510 01:01:21.184878 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186142 kubelet[2100]: E0510 01:01:21.184884 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186142 kubelet[2100]: E0510 01:01:21.184970 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186142 kubelet[2100]: W0510 01:01:21.184975 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186142 kubelet[2100]: E0510 01:01:21.184981 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186142 kubelet[2100]: E0510 01:01:21.185068 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186475 kubelet[2100]: W0510 01:01:21.185073 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186475 kubelet[2100]: E0510 01:01:21.185079 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186475 kubelet[2100]: E0510 01:01:21.185169 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186475 kubelet[2100]: W0510 01:01:21.185174 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186475 kubelet[2100]: E0510 01:01:21.185179 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186475 kubelet[2100]: E0510 01:01:21.185264 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186475 kubelet[2100]: W0510 01:01:21.185269 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186475 kubelet[2100]: E0510 01:01:21.185275 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186475 kubelet[2100]: E0510 01:01:21.185376 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186475 kubelet[2100]: W0510 01:01:21.185382 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186722 kubelet[2100]: E0510 01:01:21.185389 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186722 kubelet[2100]: E0510 01:01:21.185475 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186722 kubelet[2100]: W0510 01:01:21.185480 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186722 kubelet[2100]: E0510 01:01:21.185485 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186722 kubelet[2100]: E0510 01:01:21.185574 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186722 kubelet[2100]: W0510 01:01:21.185580 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186722 kubelet[2100]: E0510 01:01:21.185585 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186722 kubelet[2100]: E0510 01:01:21.185677 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186722 kubelet[2100]: W0510 01:01:21.185683 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186722 kubelet[2100]: E0510 01:01:21.185689 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.186971 kubelet[2100]: E0510 01:01:21.185775 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.186971 kubelet[2100]: W0510 01:01:21.185781 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.186971 kubelet[2100]: E0510 01:01:21.185787 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.201000 audit[2679]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:21.201000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef2f1a050 a2=0 a3=7ffef2f1a03c items=0 ppid=2232 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:21.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:21.206000 audit[2679]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:01:21.206000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffef2f1a050 a2=0 a3=7ffef2f1a03c items=0 ppid=2232 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:21.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:01:21.282054 kubelet[2100]: E0510 01:01:21.282034 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.282054 kubelet[2100]: W0510 01:01:21.282050 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.282195 kubelet[2100]: E0510 01:01:21.282064 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.282195 kubelet[2100]: E0510 01:01:21.282185 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.282195 kubelet[2100]: W0510 01:01:21.282190 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.282267 kubelet[2100]: E0510 01:01:21.282196 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.282324 kubelet[2100]: E0510 01:01:21.282312 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.282324 kubelet[2100]: W0510 01:01:21.282320 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.282383 kubelet[2100]: E0510 01:01:21.282325 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.282439 kubelet[2100]: E0510 01:01:21.282427 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.282439 kubelet[2100]: W0510 01:01:21.282435 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.282504 kubelet[2100]: E0510 01:01:21.282446 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.282545 kubelet[2100]: E0510 01:01:21.282534 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.282589 kubelet[2100]: W0510 01:01:21.282540 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.282589 kubelet[2100]: E0510 01:01:21.282554 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.282663 kubelet[2100]: E0510 01:01:21.282639 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.282663 kubelet[2100]: W0510 01:01:21.282644 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.282663 kubelet[2100]: E0510 01:01:21.282652 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.282773 kubelet[2100]: E0510 01:01:21.282759 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.282773 kubelet[2100]: W0510 01:01:21.282774 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.282846 kubelet[2100]: E0510 01:01:21.282779 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.283005 kubelet[2100]: E0510 01:01:21.282993 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.283005 kubelet[2100]: W0510 01:01:21.283001 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.283076 kubelet[2100]: E0510 01:01:21.283011 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.283112 kubelet[2100]: E0510 01:01:21.283106 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.283112 kubelet[2100]: W0510 01:01:21.283111 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.283169 kubelet[2100]: E0510 01:01:21.283118 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.283235 kubelet[2100]: E0510 01:01:21.283222 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.283235 kubelet[2100]: W0510 01:01:21.283231 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.283300 kubelet[2100]: E0510 01:01:21.283237 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.283341 kubelet[2100]: E0510 01:01:21.283330 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.283341 kubelet[2100]: W0510 01:01:21.283337 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.283398 kubelet[2100]: E0510 01:01:21.283344 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.283457 kubelet[2100]: E0510 01:01:21.283444 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.283457 kubelet[2100]: W0510 01:01:21.283453 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.283530 kubelet[2100]: E0510 01:01:21.283459 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.283666 kubelet[2100]: E0510 01:01:21.283656 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.283743 kubelet[2100]: W0510 01:01:21.283720 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.283811 kubelet[2100]: E0510 01:01:21.283802 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.283915 kubelet[2100]: E0510 01:01:21.283902 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.283915 kubelet[2100]: W0510 01:01:21.283915 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.284007 kubelet[2100]: E0510 01:01:21.283926 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.284037 kubelet[2100]: E0510 01:01:21.284027 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.284037 kubelet[2100]: W0510 01:01:21.284033 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.284091 kubelet[2100]: E0510 01:01:21.284038 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.284115 kubelet[2100]: E0510 01:01:21.284109 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.284141 kubelet[2100]: W0510 01:01:21.284114 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.284141 kubelet[2100]: E0510 01:01:21.284119 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.284221 kubelet[2100]: E0510 01:01:21.284201 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.284221 kubelet[2100]: W0510 01:01:21.284212 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.284221 kubelet[2100]: E0510 01:01:21.284216 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:21.284414 kubelet[2100]: E0510 01:01:21.284399 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:21.284414 kubelet[2100]: W0510 01:01:21.284405 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:21.284414 kubelet[2100]: E0510 01:01:21.284411 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.075362 kubelet[2100]: E0510 01:01:22.075338 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:22.192890 kubelet[2100]: E0510 01:01:22.192869 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.192890 kubelet[2100]: W0510 01:01:22.192884 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193115 kubelet[2100]: E0510 01:01:22.192897 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193115 kubelet[2100]: E0510 01:01:22.192986 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193115 kubelet[2100]: W0510 01:01:22.192991 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193115 kubelet[2100]: E0510 01:01:22.192996 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193115 kubelet[2100]: E0510 01:01:22.193067 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193115 kubelet[2100]: W0510 01:01:22.193072 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193115 kubelet[2100]: E0510 01:01:22.193076 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193244 kubelet[2100]: E0510 01:01:22.193148 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193244 kubelet[2100]: W0510 01:01:22.193152 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193244 kubelet[2100]: E0510 01:01:22.193157 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193244 kubelet[2100]: E0510 01:01:22.193228 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193244 kubelet[2100]: W0510 01:01:22.193232 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193244 kubelet[2100]: E0510 01:01:22.193237 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193370 kubelet[2100]: E0510 01:01:22.193314 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193370 kubelet[2100]: W0510 01:01:22.193318 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193370 kubelet[2100]: E0510 01:01:22.193322 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193431 kubelet[2100]: E0510 01:01:22.193388 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193431 kubelet[2100]: W0510 01:01:22.193392 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193431 kubelet[2100]: E0510 01:01:22.193397 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193485 kubelet[2100]: E0510 01:01:22.193464 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193485 kubelet[2100]: W0510 01:01:22.193468 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193485 kubelet[2100]: E0510 01:01:22.193472 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193555 kubelet[2100]: E0510 01:01:22.193544 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193555 kubelet[2100]: W0510 01:01:22.193550 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193555 kubelet[2100]: E0510 01:01:22.193554 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193631 kubelet[2100]: E0510 01:01:22.193622 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193631 kubelet[2100]: W0510 01:01:22.193628 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193717 kubelet[2100]: E0510 01:01:22.193633 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193740 kubelet[2100]: E0510 01:01:22.193734 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193740 kubelet[2100]: W0510 01:01:22.193738 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193778 kubelet[2100]: E0510 01:01:22.193742 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193818 kubelet[2100]: E0510 01:01:22.193809 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193818 kubelet[2100]: W0510 01:01:22.193815 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193866 kubelet[2100]: E0510 01:01:22.193819 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193896 kubelet[2100]: E0510 01:01:22.193888 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193896 kubelet[2100]: W0510 01:01:22.193895 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.193945 kubelet[2100]: E0510 01:01:22.193902 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.193980 kubelet[2100]: E0510 01:01:22.193971 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.193980 kubelet[2100]: W0510 01:01:22.193977 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.194030 kubelet[2100]: E0510 01:01:22.193982 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.194052 kubelet[2100]: E0510 01:01:22.194048 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.194071 kubelet[2100]: W0510 01:01:22.194052 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.194071 kubelet[2100]: E0510 01:01:22.194056 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.266404 env[1248]: time="2025-05-10T01:01:22.266375788Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:22.267198 env[1248]: time="2025-05-10T01:01:22.267175475Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:22.268467 env[1248]: time="2025-05-10T01:01:22.268439654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:22.269478 env[1248]: time="2025-05-10T01:01:22.269460348Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:22.269944 env[1248]: time="2025-05-10T01:01:22.269913213Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 01:01:22.272184 env[1248]: time="2025-05-10T01:01:22.271843777Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 01:01:22.283338 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount344760358.mount: Deactivated successfully. May 10 01:01:22.287466 env[1248]: time="2025-05-10T01:01:22.287420584Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8\"" May 10 01:01:22.288567 env[1248]: time="2025-05-10T01:01:22.288386786Z" level=info msg="StartContainer for \"43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8\"" May 10 01:01:22.290013 kubelet[2100]: E0510 01:01:22.289589 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.290013 kubelet[2100]: W0510 01:01:22.289600 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.290013 kubelet[2100]: E0510 01:01:22.289612 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.290013 kubelet[2100]: E0510 01:01:22.289722 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.290013 kubelet[2100]: W0510 01:01:22.289734 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.290013 kubelet[2100]: E0510 01:01:22.289740 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.290013 kubelet[2100]: E0510 01:01:22.289846 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.290013 kubelet[2100]: W0510 01:01:22.289858 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.290013 kubelet[2100]: E0510 01:01:22.289864 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.290013 kubelet[2100]: E0510 01:01:22.289963 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.290333 kubelet[2100]: W0510 01:01:22.289968 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.290333 kubelet[2100]: E0510 01:01:22.289994 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.290333 kubelet[2100]: E0510 01:01:22.290107 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.290333 kubelet[2100]: W0510 01:01:22.290114 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.290333 kubelet[2100]: E0510 01:01:22.290131 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.290333 kubelet[2100]: E0510 01:01:22.290224 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.290333 kubelet[2100]: W0510 01:01:22.290229 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.290333 kubelet[2100]: E0510 01:01:22.290234 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.290333 kubelet[2100]: E0510 01:01:22.290333 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.291874 kubelet[2100]: W0510 01:01:22.290339 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.291874 kubelet[2100]: E0510 01:01:22.290344 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.291874 kubelet[2100]: E0510 01:01:22.290445 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.291874 kubelet[2100]: W0510 01:01:22.290471 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.291874 kubelet[2100]: E0510 01:01:22.290478 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.291874 kubelet[2100]: E0510 01:01:22.290649 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.291874 kubelet[2100]: W0510 01:01:22.290656 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.291874 kubelet[2100]: E0510 01:01:22.290665 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.291874 kubelet[2100]: E0510 01:01:22.290806 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.291874 kubelet[2100]: W0510 01:01:22.290812 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.292222 kubelet[2100]: E0510 01:01:22.290836 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.292222 kubelet[2100]: E0510 01:01:22.290946 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.292222 kubelet[2100]: W0510 01:01:22.290953 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.292222 kubelet[2100]: E0510 01:01:22.290966 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.292222 kubelet[2100]: E0510 01:01:22.291130 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.292222 kubelet[2100]: W0510 01:01:22.291137 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.292222 kubelet[2100]: E0510 01:01:22.291170 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.292222 kubelet[2100]: E0510 01:01:22.291308 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.292222 kubelet[2100]: W0510 01:01:22.291316 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.292222 kubelet[2100]: E0510 01:01:22.291386 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.292572 kubelet[2100]: E0510 01:01:22.291491 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.292572 kubelet[2100]: W0510 01:01:22.291498 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.292572 kubelet[2100]: E0510 01:01:22.291511 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.292834 kubelet[2100]: E0510 01:01:22.292801 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.292834 kubelet[2100]: W0510 01:01:22.292808 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.292834 kubelet[2100]: E0510 01:01:22.292819 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.293036 kubelet[2100]: E0510 01:01:22.293020 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.293089 kubelet[2100]: W0510 01:01:22.293036 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.293089 kubelet[2100]: E0510 01:01:22.293045 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.293269 kubelet[2100]: E0510 01:01:22.293257 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.293269 kubelet[2100]: W0510 01:01:22.293265 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.293269 kubelet[2100]: E0510 01:01:22.293272 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.293607 kubelet[2100]: E0510 01:01:22.293574 2100 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 01:01:22.293607 kubelet[2100]: W0510 01:01:22.293587 2100 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 01:01:22.293607 kubelet[2100]: E0510 01:01:22.293593 2100 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 01:01:22.305557 systemd[1]: Started cri-containerd-43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8.scope. May 10 01:01:22.319000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f65c0d0d808 items=0 ppid=2522 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:22.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643236633635383738383335343930643030626536643938383838 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.319000 audit: BPF prog-id=130 op=LOAD May 10 01:01:22.319000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003a2158 items=0 ppid=2522 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:22.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643236633635383738383335343930643030626536643938383838 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit: BPF prog-id=131 op=LOAD May 10 01:01:22.320000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003a21a8 items=0 ppid=2522 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:22.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643236633635383738383335343930643030626536643938383838 May 10 01:01:22.320000 audit: BPF prog-id=131 op=UNLOAD May 10 01:01:22.320000 audit: BPF prog-id=130 op=UNLOAD May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:22.320000 audit: BPF prog-id=132 op=LOAD May 10 01:01:22.320000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003a2238 items=0 ppid=2522 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:22.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643236633635383738383335343930643030626536643938383838 May 10 01:01:22.339480 systemd[1]: cri-containerd-43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8.scope: Deactivated successfully. May 10 01:01:22.343000 audit: BPF prog-id=132 op=UNLOAD May 10 01:01:22.350742 env[1248]: time="2025-05-10T01:01:22.350682025Z" level=info msg="StartContainer for \"43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8\" returns successfully" May 10 01:01:22.467721 env[1248]: time="2025-05-10T01:01:22.467687603Z" level=info msg="shim disconnected" id=43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8 May 10 01:01:22.467721 env[1248]: time="2025-05-10T01:01:22.467721582Z" level=warning msg="cleaning up after shim disconnected" id=43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8 namespace=k8s.io May 10 01:01:22.467721 env[1248]: time="2025-05-10T01:01:22.467730366Z" level=info msg="cleaning up dead shim" May 10 01:01:22.472766 env[1248]: time="2025-05-10T01:01:22.472746019Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:01:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2779 runtime=io.containerd.runc.v2\n" May 10 01:01:22.646858 systemd[1]: run-containerd-runc-k8s.io-43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8-runc.6Ls9by.mount: Deactivated successfully. May 10 01:01:22.646916 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8-rootfs.mount: Deactivated successfully. May 10 01:01:23.162180 env[1248]: time="2025-05-10T01:01:23.162153874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 01:01:24.075800 kubelet[2100]: E0510 01:01:24.075780 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:26.075593 kubelet[2100]: E0510 01:01:26.075564 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:27.741232 env[1248]: time="2025-05-10T01:01:27.741194848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:27.743625 env[1248]: time="2025-05-10T01:01:27.743607948Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:27.744513 env[1248]: time="2025-05-10T01:01:27.744499264Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:27.745388 env[1248]: time="2025-05-10T01:01:27.745359431Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:27.745813 env[1248]: time="2025-05-10T01:01:27.745795243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 01:01:27.751141 env[1248]: time="2025-05-10T01:01:27.751125120Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 01:01:27.758019 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount15721745.mount: Deactivated successfully. May 10 01:01:27.760011 env[1248]: time="2025-05-10T01:01:27.759991532Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc\"" May 10 01:01:27.760504 env[1248]: time="2025-05-10T01:01:27.760492583Z" level=info msg="StartContainer for \"03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc\"" May 10 01:01:27.775048 systemd[1]: Started cri-containerd-03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc.scope. May 10 01:01:27.788000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.790354 kernel: kauditd_printk_skb: 229 callbacks suppressed May 10 01:01:27.792835 kernel: audit: type=1400 audit(1746838887.788:979): avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792859 kernel: audit: type=1300 audit(1746838887.788:979): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe77a7742f8 items=0 ppid=2522 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:27.788000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe77a7742f8 items=0 ppid=2522 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:27.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033323139663764346139306434636535646234646531653837343363 May 10 01:01:27.799939 kernel: audit: type=1327 audit(1746838887.788:979): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033323139663764346139306434636535646234646531653837343363 May 10 01:01:27.799971 kernel: audit: type=1400 audit(1746838887.788:980): avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.804715 kernel: audit: type=1400 audit(1746838887.788:980): avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.804744 kernel: audit: type=1400 audit(1746838887.788:980): avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.809660 kernel: audit: type=1400 audit(1746838887.788:980): avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.812291 kernel: audit: type=1400 audit(1746838887.788:980): avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.815014 kernel: audit: type=1400 audit(1746838887.788:980): avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.820319 kernel: audit: type=1400 audit(1746838887.788:980): avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.788000 audit: BPF prog-id=133 op=LOAD May 10 01:01:27.788000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243b8 items=0 ppid=2522 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:27.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033323139663764346139306434636535646234646531653837343363 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.792000 audit: BPF prog-id=134 op=LOAD May 10 01:01:27.792000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024408 items=0 ppid=2522 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:27.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033323139663764346139306434636535646234646531653837343363 May 10 01:01:27.795000 audit: BPF prog-id=134 op=UNLOAD May 10 01:01:27.795000 audit: BPF prog-id=133 op=UNLOAD May 10 01:01:27.795000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { perfmon } for pid=2807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit[2807]: AVC avc: denied { bpf } for pid=2807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:27.795000 audit: BPF prog-id=135 op=LOAD May 10 01:01:27.795000 audit[2807]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024498 items=0 ppid=2522 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:27.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033323139663764346139306434636535646234646531653837343363 May 10 01:01:27.826189 env[1248]: time="2025-05-10T01:01:27.826160171Z" level=info msg="StartContainer for \"03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc\" returns successfully" May 10 01:01:28.075394 kubelet[2100]: E0510 01:01:28.075350 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:28.756140 systemd[1]: run-containerd-runc-k8s.io-03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc-runc.kTnSLP.mount: Deactivated successfully. May 10 01:01:29.098999 systemd[1]: cri-containerd-03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc.scope: Deactivated successfully. May 10 01:01:29.102000 audit: BPF prog-id=135 op=UNLOAD May 10 01:01:29.112104 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc-rootfs.mount: Deactivated successfully. May 10 01:01:29.115440 env[1248]: time="2025-05-10T01:01:29.115404669Z" level=info msg="shim disconnected" id=03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc May 10 01:01:29.115627 env[1248]: time="2025-05-10T01:01:29.115445160Z" level=warning msg="cleaning up after shim disconnected" id=03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc namespace=k8s.io May 10 01:01:29.115627 env[1248]: time="2025-05-10T01:01:29.115453444Z" level=info msg="cleaning up dead shim" May 10 01:01:29.120346 env[1248]: time="2025-05-10T01:01:29.120319112Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:01:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2849 runtime=io.containerd.runc.v2\n" May 10 01:01:29.171440 env[1248]: time="2025-05-10T01:01:29.171366455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 01:01:29.198925 kubelet[2100]: I0510 01:01:29.198903 2100 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 10 01:01:29.243907 systemd[1]: Created slice kubepods-burstable-pod6c7072c9_84f3_4473_ab9f_6d77c8d21e93.slice. May 10 01:01:29.251374 systemd[1]: Created slice kubepods-burstable-pod677c37f1_d746_4690_85e1_7fe9cdc46ac3.slice. May 10 01:01:29.257172 systemd[1]: Created slice kubepods-besteffort-pod6c24de29_5fd2_48e8_aadf_9db45ec25d51.slice. May 10 01:01:29.261568 systemd[1]: Created slice kubepods-besteffort-pod41128e7d_a5aa_4fe4_bf46_b5240a85e276.slice. May 10 01:01:29.265610 systemd[1]: Created slice kubepods-besteffort-pod4d0efb5e_e655_4540_9c5c_9c1ebcc357c2.slice. May 10 01:01:29.326121 kubelet[2100]: I0510 01:01:29.326093 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6c7072c9-84f3-4473-ab9f-6d77c8d21e93-config-volume\") pod \"coredns-6f6b679f8f-qj7qn\" (UID: \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\") " pod="kube-system/coredns-6f6b679f8f-qj7qn" May 10 01:01:29.326475 kubelet[2100]: I0510 01:01:29.326464 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-65lmf\" (UniqueName: \"kubernetes.io/projected/6c7072c9-84f3-4473-ab9f-6d77c8d21e93-kube-api-access-65lmf\") pod \"coredns-6f6b679f8f-qj7qn\" (UID: \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\") " pod="kube-system/coredns-6f6b679f8f-qj7qn" May 10 01:01:29.426934 kubelet[2100]: I0510 01:01:29.426857 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wkjhz\" (UniqueName: \"kubernetes.io/projected/677c37f1-d746-4690-85e1-7fe9cdc46ac3-kube-api-access-wkjhz\") pod \"coredns-6f6b679f8f-smvpz\" (UID: \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\") " pod="kube-system/coredns-6f6b679f8f-smvpz" May 10 01:01:29.427089 kubelet[2100]: I0510 01:01:29.427075 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-46sth\" (UniqueName: \"kubernetes.io/projected/4d0efb5e-e655-4540-9c5c-9c1ebcc357c2-kube-api-access-46sth\") pod \"calico-kube-controllers-677495b4c7-vktzl\" (UID: \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\") " pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" May 10 01:01:29.427632 kubelet[2100]: I0510 01:01:29.427557 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9qdh\" (UniqueName: \"kubernetes.io/projected/6c24de29-5fd2-48e8-aadf-9db45ec25d51-kube-api-access-v9qdh\") pod \"calico-apiserver-7c5c86885d-x2ndc\" (UID: \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\") " pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" May 10 01:01:29.427632 kubelet[2100]: I0510 01:01:29.427599 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6c24de29-5fd2-48e8-aadf-9db45ec25d51-calico-apiserver-certs\") pod \"calico-apiserver-7c5c86885d-x2ndc\" (UID: \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\") " pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" May 10 01:01:29.427632 kubelet[2100]: I0510 01:01:29.427614 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gdm4q\" (UniqueName: \"kubernetes.io/projected/41128e7d-a5aa-4fe4-bf46-b5240a85e276-kube-api-access-gdm4q\") pod \"calico-apiserver-7c5c86885d-wtfct\" (UID: \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\") " pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" May 10 01:01:29.427755 kubelet[2100]: I0510 01:01:29.427651 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/41128e7d-a5aa-4fe4-bf46-b5240a85e276-calico-apiserver-certs\") pod \"calico-apiserver-7c5c86885d-wtfct\" (UID: \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\") " pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" May 10 01:01:29.427755 kubelet[2100]: I0510 01:01:29.427669 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4d0efb5e-e655-4540-9c5c-9c1ebcc357c2-tigera-ca-bundle\") pod \"calico-kube-controllers-677495b4c7-vktzl\" (UID: \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\") " pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" May 10 01:01:29.427755 kubelet[2100]: I0510 01:01:29.427684 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/677c37f1-d746-4690-85e1-7fe9cdc46ac3-config-volume\") pod \"coredns-6f6b679f8f-smvpz\" (UID: \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\") " pod="kube-system/coredns-6f6b679f8f-smvpz" May 10 01:01:29.549064 env[1248]: time="2025-05-10T01:01:29.548800464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qj7qn,Uid:6c7072c9-84f3-4473-ab9f-6d77c8d21e93,Namespace:kube-system,Attempt:0,}" May 10 01:01:29.554862 env[1248]: time="2025-05-10T01:01:29.554844187Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-smvpz,Uid:677c37f1-d746-4690-85e1-7fe9cdc46ac3,Namespace:kube-system,Attempt:0,}" May 10 01:01:29.562909 env[1248]: time="2025-05-10T01:01:29.562892900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5c86885d-x2ndc,Uid:6c24de29-5fd2-48e8-aadf-9db45ec25d51,Namespace:calico-apiserver,Attempt:0,}" May 10 01:01:29.565007 env[1248]: time="2025-05-10T01:01:29.564983924Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5c86885d-wtfct,Uid:41128e7d-a5aa-4fe4-bf46-b5240a85e276,Namespace:calico-apiserver,Attempt:0,}" May 10 01:01:29.570357 env[1248]: time="2025-05-10T01:01:29.570334894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-677495b4c7-vktzl,Uid:4d0efb5e-e655-4540-9c5c-9c1ebcc357c2,Namespace:calico-system,Attempt:0,}" May 10 01:01:29.788858 env[1248]: time="2025-05-10T01:01:29.788813656Z" level=error msg="Failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.790268 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b-shm.mount: Deactivated successfully. May 10 01:01:29.790902 env[1248]: time="2025-05-10T01:01:29.790884154Z" level=error msg="encountered an error cleaning up failed sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.790984 env[1248]: time="2025-05-10T01:01:29.790966691Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5c86885d-x2ndc,Uid:6c24de29-5fd2-48e8-aadf-9db45ec25d51,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.791396 kubelet[2100]: E0510 01:01:29.791168 2100 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.791396 kubelet[2100]: E0510 01:01:29.791214 2100 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" May 10 01:01:29.791396 kubelet[2100]: E0510 01:01:29.791228 2100 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" May 10 01:01:29.791497 kubelet[2100]: E0510 01:01:29.791267 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7c5c86885d-x2ndc_calico-apiserver(6c24de29-5fd2-48e8-aadf-9db45ec25d51)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7c5c86885d-x2ndc_calico-apiserver(6c24de29-5fd2-48e8-aadf-9db45ec25d51)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" podUID="6c24de29-5fd2-48e8-aadf-9db45ec25d51" May 10 01:01:29.791642 env[1248]: time="2025-05-10T01:01:29.791619088Z" level=error msg="Failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.792753 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6-shm.mount: Deactivated successfully. May 10 01:01:29.793666 env[1248]: time="2025-05-10T01:01:29.793414867Z" level=error msg="encountered an error cleaning up failed sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.793666 env[1248]: time="2025-05-10T01:01:29.793461666Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5c86885d-wtfct,Uid:41128e7d-a5aa-4fe4-bf46-b5240a85e276,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.794902 kubelet[2100]: E0510 01:01:29.793778 2100 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.794902 kubelet[2100]: E0510 01:01:29.793799 2100 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" May 10 01:01:29.794902 kubelet[2100]: E0510 01:01:29.793810 2100 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" May 10 01:01:29.795086 kubelet[2100]: E0510 01:01:29.793833 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7c5c86885d-wtfct_calico-apiserver(41128e7d-a5aa-4fe4-bf46-b5240a85e276)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7c5c86885d-wtfct_calico-apiserver(41128e7d-a5aa-4fe4-bf46-b5240a85e276)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" podUID="41128e7d-a5aa-4fe4-bf46-b5240a85e276" May 10 01:01:29.797950 env[1248]: time="2025-05-10T01:01:29.797919322Z" level=error msg="Failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.799194 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15-shm.mount: Deactivated successfully. May 10 01:01:29.799847 env[1248]: time="2025-05-10T01:01:29.799824379Z" level=error msg="encountered an error cleaning up failed sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.799895 env[1248]: time="2025-05-10T01:01:29.799858793Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-smvpz,Uid:677c37f1-d746-4690-85e1-7fe9cdc46ac3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.800414 kubelet[2100]: E0510 01:01:29.799986 2100 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.800414 kubelet[2100]: E0510 01:01:29.800012 2100 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-smvpz" May 10 01:01:29.800414 kubelet[2100]: E0510 01:01:29.800036 2100 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-smvpz" May 10 01:01:29.800524 kubelet[2100]: E0510 01:01:29.800056 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-smvpz_kube-system(677c37f1-d746-4690-85e1-7fe9cdc46ac3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-smvpz_kube-system(677c37f1-d746-4690-85e1-7fe9cdc46ac3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-smvpz" podUID="677c37f1-d746-4690-85e1-7fe9cdc46ac3" May 10 01:01:29.805086 env[1248]: time="2025-05-10T01:01:29.805062862Z" level=error msg="Failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.806383 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf-shm.mount: Deactivated successfully. May 10 01:01:29.807001 env[1248]: time="2025-05-10T01:01:29.806982556Z" level=error msg="encountered an error cleaning up failed sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.807110 env[1248]: time="2025-05-10T01:01:29.807078286Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qj7qn,Uid:6c7072c9-84f3-4473-ab9f-6d77c8d21e93,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.807737 kubelet[2100]: E0510 01:01:29.807246 2100 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.807737 kubelet[2100]: E0510 01:01:29.807272 2100 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-qj7qn" May 10 01:01:29.807737 kubelet[2100]: E0510 01:01:29.807292 2100 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-qj7qn" May 10 01:01:29.807847 kubelet[2100]: E0510 01:01:29.807313 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-qj7qn_kube-system(6c7072c9-84f3-4473-ab9f-6d77c8d21e93)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-qj7qn_kube-system(6c7072c9-84f3-4473-ab9f-6d77c8d21e93)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qj7qn" podUID="6c7072c9-84f3-4473-ab9f-6d77c8d21e93" May 10 01:01:29.813148 env[1248]: time="2025-05-10T01:01:29.813118739Z" level=error msg="Failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.813434 env[1248]: time="2025-05-10T01:01:29.813416989Z" level=error msg="encountered an error cleaning up failed sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.813514 env[1248]: time="2025-05-10T01:01:29.813496372Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-677495b4c7-vktzl,Uid:4d0efb5e-e655-4540-9c5c-9c1ebcc357c2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.814153 kubelet[2100]: E0510 01:01:29.813661 2100 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:29.814153 kubelet[2100]: E0510 01:01:29.813686 2100 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" May 10 01:01:29.814153 kubelet[2100]: E0510 01:01:29.813698 2100 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" May 10 01:01:29.814261 kubelet[2100]: E0510 01:01:29.813717 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-677495b4c7-vktzl_calico-system(4d0efb5e-e655-4540-9c5c-9c1ebcc357c2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-677495b4c7-vktzl_calico-system(4d0efb5e-e655-4540-9c5c-9c1ebcc357c2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" podUID="4d0efb5e-e655-4540-9c5c-9c1ebcc357c2" May 10 01:01:30.079148 systemd[1]: Created slice kubepods-besteffort-pod496dec10_f9bd_4cc8_9fbd_5feb996d9abc.slice. May 10 01:01:30.082649 env[1248]: time="2025-05-10T01:01:30.082613094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9qdlp,Uid:496dec10-f9bd-4cc8-9fbd-5feb996d9abc,Namespace:calico-system,Attempt:0,}" May 10 01:01:30.117712 env[1248]: time="2025-05-10T01:01:30.117679126Z" level=error msg="Failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.118149 env[1248]: time="2025-05-10T01:01:30.118132052Z" level=error msg="encountered an error cleaning up failed sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.118227 env[1248]: time="2025-05-10T01:01:30.118211225Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9qdlp,Uid:496dec10-f9bd-4cc8-9fbd-5feb996d9abc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.118766 kubelet[2100]: E0510 01:01:30.118391 2100 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.118766 kubelet[2100]: E0510 01:01:30.118443 2100 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9qdlp" May 10 01:01:30.118766 kubelet[2100]: E0510 01:01:30.118472 2100 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9qdlp" May 10 01:01:30.119532 kubelet[2100]: E0510 01:01:30.118542 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9qdlp_calico-system(496dec10-f9bd-4cc8-9fbd-5feb996d9abc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9qdlp_calico-system(496dec10-f9bd-4cc8-9fbd-5feb996d9abc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:30.171641 kubelet[2100]: I0510 01:01:30.171612 2100 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:01:30.173444 kubelet[2100]: I0510 01:01:30.173420 2100 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:01:30.178582 kubelet[2100]: I0510 01:01:30.178563 2100 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:01:30.180826 kubelet[2100]: I0510 01:01:30.180805 2100 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:01:30.183115 kubelet[2100]: I0510 01:01:30.183084 2100 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:01:30.184323 kubelet[2100]: I0510 01:01:30.183956 2100 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:01:30.186023 env[1248]: time="2025-05-10T01:01:30.185985799Z" level=info msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\"" May 10 01:01:30.186606 env[1248]: time="2025-05-10T01:01:30.186581028Z" level=info msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\"" May 10 01:01:30.186944 env[1248]: time="2025-05-10T01:01:30.186910451Z" level=info msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\"" May 10 01:01:30.187281 env[1248]: time="2025-05-10T01:01:30.187264587Z" level=info msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\"" May 10 01:01:30.187599 env[1248]: time="2025-05-10T01:01:30.187583188Z" level=info msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\"" May 10 01:01:30.187903 env[1248]: time="2025-05-10T01:01:30.187886565Z" level=info msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\"" May 10 01:01:30.223665 env[1248]: time="2025-05-10T01:01:30.223630923Z" level=error msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\" failed" error="failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.223926 kubelet[2100]: E0510 01:01:30.223894 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:01:30.224094 kubelet[2100]: E0510 01:01:30.223943 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf"} May 10 01:01:30.224094 kubelet[2100]: E0510 01:01:30.223997 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:30.224094 kubelet[2100]: E0510 01:01:30.224011 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qj7qn" podUID="6c7072c9-84f3-4473-ab9f-6d77c8d21e93" May 10 01:01:30.229346 env[1248]: time="2025-05-10T01:01:30.229310546Z" level=error msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\" failed" error="failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.229503 kubelet[2100]: E0510 01:01:30.229486 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:01:30.229540 kubelet[2100]: E0510 01:01:30.229506 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15"} May 10 01:01:30.229540 kubelet[2100]: E0510 01:01:30.229531 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:30.229607 kubelet[2100]: E0510 01:01:30.229545 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-smvpz" podUID="677c37f1-d746-4690-85e1-7fe9cdc46ac3" May 10 01:01:30.237974 env[1248]: time="2025-05-10T01:01:30.237946561Z" level=error msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\" failed" error="failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.238237 kubelet[2100]: E0510 01:01:30.238174 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:01:30.238290 kubelet[2100]: E0510 01:01:30.238244 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e"} May 10 01:01:30.238290 kubelet[2100]: E0510 01:01:30.238276 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:30.238369 kubelet[2100]: E0510 01:01:30.238307 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" podUID="4d0efb5e-e655-4540-9c5c-9c1ebcc357c2" May 10 01:01:30.239687 env[1248]: time="2025-05-10T01:01:30.239669407Z" level=error msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\" failed" error="failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.239853 kubelet[2100]: E0510 01:01:30.239796 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:01:30.239853 kubelet[2100]: E0510 01:01:30.239813 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b"} May 10 01:01:30.239853 kubelet[2100]: E0510 01:01:30.239829 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:30.239853 kubelet[2100]: E0510 01:01:30.239840 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" podUID="6c24de29-5fd2-48e8-aadf-9db45ec25d51" May 10 01:01:30.245755 env[1248]: time="2025-05-10T01:01:30.245733889Z" level=error msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\" failed" error="failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.245913 kubelet[2100]: E0510 01:01:30.245887 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:01:30.246209 kubelet[2100]: E0510 01:01:30.245924 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442"} May 10 01:01:30.246209 kubelet[2100]: E0510 01:01:30.245944 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:30.246209 kubelet[2100]: E0510 01:01:30.245955 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:30.252554 env[1248]: time="2025-05-10T01:01:30.252534475Z" level=error msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\" failed" error="failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:30.253304 kubelet[2100]: E0510 01:01:30.252701 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:01:30.253304 kubelet[2100]: E0510 01:01:30.252719 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6"} May 10 01:01:30.253304 kubelet[2100]: E0510 01:01:30.252734 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:30.253304 kubelet[2100]: E0510 01:01:30.252745 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" podUID="41128e7d-a5aa-4fe4-bf46-b5240a85e276" May 10 01:01:30.756358 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e-shm.mount: Deactivated successfully. May 10 01:01:36.488144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1370610419.mount: Deactivated successfully. May 10 01:01:36.545596 env[1248]: time="2025-05-10T01:01:36.545557491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:36.549738 env[1248]: time="2025-05-10T01:01:36.549718561Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:36.550661 env[1248]: time="2025-05-10T01:01:36.550645066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:36.551633 env[1248]: time="2025-05-10T01:01:36.551616759Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:01:36.552584 env[1248]: time="2025-05-10T01:01:36.552565465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 01:01:36.582630 env[1248]: time="2025-05-10T01:01:36.582600556Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 01:01:36.591492 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount53372433.mount: Deactivated successfully. May 10 01:01:36.598820 env[1248]: time="2025-05-10T01:01:36.598796938Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879\"" May 10 01:01:36.600152 env[1248]: time="2025-05-10T01:01:36.600124085Z" level=info msg="StartContainer for \"8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879\"" May 10 01:01:36.610039 systemd[1]: Started cri-containerd-8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879.scope. May 10 01:01:36.624000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.636340 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 01:01:36.638665 kernel: audit: type=1400 audit(1746838896.624:986): avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.639418 kernel: audit: type=1300 audit(1746838896.624:986): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f119c13a2f8 items=0 ppid=2522 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:36.639462 kernel: audit: type=1327 audit(1746838896.624:986): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306631386665366562333564326564373061616463303763313138 May 10 01:01:36.639486 kernel: audit: type=1400 audit(1746838896.624:987): avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.639505 kernel: audit: type=1400 audit(1746838896.624:987): avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f119c13a2f8 items=0 ppid=2522 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:36.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306631386665366562333564326564373061616463303763313138 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.648231 kernel: audit: type=1400 audit(1746838896.624:987): avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.648293 kernel: audit: type=1400 audit(1746838896.624:987): avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.653686 kernel: audit: type=1400 audit(1746838896.624:987): avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.653708 kernel: audit: type=1400 audit(1746838896.624:987): avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.653723 kernel: audit: type=1400 audit(1746838896.624:987): avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.624000 audit: BPF prog-id=136 op=LOAD May 10 01:01:36.624000 audit[3181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024248 items=0 ppid=2522 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:36.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306631386665366562333564326564373061616463303763313138 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.631000 audit: BPF prog-id=137 op=LOAD May 10 01:01:36.631000 audit[3181]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024298 items=0 ppid=2522 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:36.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306631386665366562333564326564373061616463303763313138 May 10 01:01:36.635000 audit: BPF prog-id=137 op=UNLOAD May 10 01:01:36.635000 audit: BPF prog-id=136 op=UNLOAD May 10 01:01:36.635000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:36.635000 audit: BPF prog-id=138 op=LOAD May 10 01:01:36.635000 audit[3181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024328 items=0 ppid=2522 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:36.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861306631386665366562333564326564373061616463303763313138 May 10 01:01:36.657820 env[1248]: time="2025-05-10T01:01:36.657801439Z" level=info msg="StartContainer for \"8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879\" returns successfully" May 10 01:01:37.333039 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 01:01:37.333134 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 01:01:37.382933 systemd[1]: cri-containerd-8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879.scope: Deactivated successfully. May 10 01:01:37.385000 audit: BPF prog-id=138 op=UNLOAD May 10 01:01:37.403703 env[1248]: time="2025-05-10T01:01:37.403678528Z" level=info msg="shim disconnected" id=8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879 May 10 01:01:37.403828 env[1248]: time="2025-05-10T01:01:37.403816731Z" level=warning msg="cleaning up after shim disconnected" id=8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879 namespace=k8s.io May 10 01:01:37.403876 env[1248]: time="2025-05-10T01:01:37.403864843Z" level=info msg="cleaning up dead shim" May 10 01:01:37.408631 env[1248]: time="2025-05-10T01:01:37.408595485Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:01:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3254 runtime=io.containerd.runc.v2\ntime=\"2025-05-10T01:01:37Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" May 10 01:01:38.205222 kubelet[2100]: I0510 01:01:38.205199 2100 scope.go:117] "RemoveContainer" containerID="8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879" May 10 01:01:38.206778 env[1248]: time="2025-05-10T01:01:38.206752467Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" May 10 01:01:38.214873 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount849213816.mount: Deactivated successfully. May 10 01:01:38.217258 env[1248]: time="2025-05-10T01:01:38.217236060Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265\"" May 10 01:01:38.217659 env[1248]: time="2025-05-10T01:01:38.217641405Z" level=info msg="StartContainer for \"1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265\"" May 10 01:01:38.231189 systemd[1]: Started cri-containerd-1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265.scope. May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f107044bdc8 items=0 ppid=2522 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:38.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313039343434303864383564333063336462346666303338636537 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit: BPF prog-id=139 op=LOAD May 10 01:01:38.246000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003901c8 items=0 ppid=2522 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:38.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313039343434303864383564333063336462346666303338636537 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit: BPF prog-id=140 op=LOAD May 10 01:01:38.246000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000390218 items=0 ppid=2522 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:38.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313039343434303864383564333063336462346666303338636537 May 10 01:01:38.246000 audit: BPF prog-id=140 op=UNLOAD May 10 01:01:38.246000 audit: BPF prog-id=139 op=UNLOAD May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:38.246000 audit: BPF prog-id=141 op=LOAD May 10 01:01:38.246000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003902a8 items=0 ppid=2522 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:38.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161313039343434303864383564333063336462346666303338636537 May 10 01:01:38.259763 env[1248]: time="2025-05-10T01:01:38.259741574Z" level=info msg="StartContainer for \"1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265\" returns successfully" May 10 01:01:38.323889 systemd[1]: cri-containerd-1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265.scope: Deactivated successfully. May 10 01:01:38.328000 audit: BPF prog-id=141 op=UNLOAD May 10 01:01:38.339579 env[1248]: time="2025-05-10T01:01:38.339549474Z" level=info msg="shim disconnected" id=1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265 May 10 01:01:38.339579 env[1248]: time="2025-05-10T01:01:38.339577791Z" level=warning msg="cleaning up after shim disconnected" id=1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265 namespace=k8s.io May 10 01:01:38.339688 env[1248]: time="2025-05-10T01:01:38.339583718Z" level=info msg="cleaning up dead shim" May 10 01:01:38.343952 env[1248]: time="2025-05-10T01:01:38.343938210Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:01:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3318 runtime=io.containerd.runc.v2\n" May 10 01:01:38.488754 systemd[1]: run-containerd-runc-k8s.io-1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265-runc.2tYxNy.mount: Deactivated successfully. May 10 01:01:38.488825 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265-rootfs.mount: Deactivated successfully. May 10 01:01:39.202672 kubelet[2100]: I0510 01:01:39.202650 2100 scope.go:117] "RemoveContainer" containerID="8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879" May 10 01:01:39.203963 kubelet[2100]: I0510 01:01:39.203073 2100 scope.go:117] "RemoveContainer" containerID="1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265" May 10 01:01:39.206086 kubelet[2100]: E0510 01:01:39.206067 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-4gx8r_calico-system(76aee3d8-2662-4b23-a26f-5cebe012bd82)\"" pod="calico-system/calico-node-4gx8r" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" May 10 01:01:39.206415 env[1248]: time="2025-05-10T01:01:39.206088019Z" level=info msg="RemoveContainer for \"8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879\"" May 10 01:01:39.207700 env[1248]: time="2025-05-10T01:01:39.207677668Z" level=info msg="RemoveContainer for \"8a0f18fe6eb35d2ed70aadc07c11889ac916324bc1e3e06bee916bdd4ff9b879\" returns successfully" May 10 01:01:40.204955 kubelet[2100]: I0510 01:01:40.204931 2100 scope.go:117] "RemoveContainer" containerID="1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265" May 10 01:01:40.205084 kubelet[2100]: E0510 01:01:40.205047 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-4gx8r_calico-system(76aee3d8-2662-4b23-a26f-5cebe012bd82)\"" pod="calico-system/calico-node-4gx8r" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" May 10 01:01:41.075814 env[1248]: time="2025-05-10T01:01:41.075786379Z" level=info msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\"" May 10 01:01:41.094953 env[1248]: time="2025-05-10T01:01:41.094921789Z" level=error msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\" failed" error="failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:41.095670 kubelet[2100]: E0510 01:01:41.095249 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:01:41.095670 kubelet[2100]: E0510 01:01:41.095279 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf"} May 10 01:01:41.095670 kubelet[2100]: E0510 01:01:41.095310 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:41.095670 kubelet[2100]: E0510 01:01:41.095325 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qj7qn" podUID="6c7072c9-84f3-4473-ab9f-6d77c8d21e93" May 10 01:01:42.076113 env[1248]: time="2025-05-10T01:01:42.076079310Z" level=info msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\"" May 10 01:01:42.093257 env[1248]: time="2025-05-10T01:01:42.093223978Z" level=error msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\" failed" error="failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:42.093572 kubelet[2100]: E0510 01:01:42.093470 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:01:42.093572 kubelet[2100]: E0510 01:01:42.093510 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6"} May 10 01:01:42.093572 kubelet[2100]: E0510 01:01:42.093537 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:42.093572 kubelet[2100]: E0510 01:01:42.093550 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" podUID="41128e7d-a5aa-4fe4-bf46-b5240a85e276" May 10 01:01:43.076126 env[1248]: time="2025-05-10T01:01:43.076092707Z" level=info msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\"" May 10 01:01:43.076631 env[1248]: time="2025-05-10T01:01:43.076612963Z" level=info msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\"" May 10 01:01:43.104405 env[1248]: time="2025-05-10T01:01:43.104372122Z" level=error msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\" failed" error="failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:43.104666 kubelet[2100]: E0510 01:01:43.104626 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:01:43.104830 kubelet[2100]: E0510 01:01:43.104675 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442"} May 10 01:01:43.104830 kubelet[2100]: E0510 01:01:43.104698 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:43.104830 kubelet[2100]: E0510 01:01:43.104711 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:43.105495 env[1248]: time="2025-05-10T01:01:43.105466375Z" level=error msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\" failed" error="failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:43.105627 kubelet[2100]: E0510 01:01:43.105570 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:01:43.105627 kubelet[2100]: E0510 01:01:43.105588 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b"} May 10 01:01:43.105627 kubelet[2100]: E0510 01:01:43.105602 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:43.105627 kubelet[2100]: E0510 01:01:43.105613 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" podUID="6c24de29-5fd2-48e8-aadf-9db45ec25d51" May 10 01:01:45.076778 env[1248]: time="2025-05-10T01:01:45.076710989Z" level=info msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\"" May 10 01:01:45.077221 env[1248]: time="2025-05-10T01:01:45.077197546Z" level=info msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\"" May 10 01:01:45.097452 env[1248]: time="2025-05-10T01:01:45.097413858Z" level=error msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\" failed" error="failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:45.097746 kubelet[2100]: E0510 01:01:45.097634 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:01:45.097746 kubelet[2100]: E0510 01:01:45.097676 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e"} May 10 01:01:45.097746 kubelet[2100]: E0510 01:01:45.097699 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:45.097746 kubelet[2100]: E0510 01:01:45.097715 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" podUID="4d0efb5e-e655-4540-9c5c-9c1ebcc357c2" May 10 01:01:45.100421 env[1248]: time="2025-05-10T01:01:45.100396148Z" level=error msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\" failed" error="failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:45.100490 kubelet[2100]: E0510 01:01:45.100470 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:01:45.100523 kubelet[2100]: E0510 01:01:45.100492 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15"} May 10 01:01:45.100523 kubelet[2100]: E0510 01:01:45.100508 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:45.100593 kubelet[2100]: E0510 01:01:45.100520 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-smvpz" podUID="677c37f1-d746-4690-85e1-7fe9cdc46ac3" May 10 01:01:53.076337 env[1248]: time="2025-05-10T01:01:53.075742318Z" level=info msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\"" May 10 01:01:53.093266 env[1248]: time="2025-05-10T01:01:53.093219834Z" level=error msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\" failed" error="failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:53.093437 kubelet[2100]: E0510 01:01:53.093409 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:01:53.093677 kubelet[2100]: E0510 01:01:53.093446 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf"} May 10 01:01:53.093677 kubelet[2100]: E0510 01:01:53.093479 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:53.093677 kubelet[2100]: E0510 01:01:53.093494 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qj7qn" podUID="6c7072c9-84f3-4473-ab9f-6d77c8d21e93" May 10 01:01:54.076180 kubelet[2100]: I0510 01:01:54.076152 2100 scope.go:117] "RemoveContainer" containerID="1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265" May 10 01:01:54.076845 env[1248]: time="2025-05-10T01:01:54.076820293Z" level=info msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\"" May 10 01:01:54.077858 env[1248]: time="2025-05-10T01:01:54.077039038Z" level=info msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\"" May 10 01:01:54.078738 env[1248]: time="2025-05-10T01:01:54.078207406Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" May 10 01:01:54.085040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1531645248.mount: Deactivated successfully. May 10 01:01:54.087117 env[1248]: time="2025-05-10T01:01:54.087091934Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb\"" May 10 01:01:54.087447 env[1248]: time="2025-05-10T01:01:54.087431059Z" level=info msg="StartContainer for \"2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb\"" May 10 01:01:54.110690 env[1248]: time="2025-05-10T01:01:54.110655450Z" level=error msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\" failed" error="failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:54.111028 kubelet[2100]: E0510 01:01:54.110914 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:01:54.111028 kubelet[2100]: E0510 01:01:54.110963 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442"} May 10 01:01:54.111028 kubelet[2100]: E0510 01:01:54.110983 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:54.111028 kubelet[2100]: E0510 01:01:54.110997 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:01:54.115255 systemd[1]: Started cri-containerd-2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb.scope. May 10 01:01:54.120384 env[1248]: time="2025-05-10T01:01:54.120221889Z" level=error msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\" failed" error="failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:54.120548 kubelet[2100]: E0510 01:01:54.120467 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:01:54.120548 kubelet[2100]: E0510 01:01:54.120494 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b"} May 10 01:01:54.120548 kubelet[2100]: E0510 01:01:54.120512 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:54.120548 kubelet[2100]: E0510 01:01:54.120525 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" podUID="6c24de29-5fd2-48e8-aadf-9db45ec25d51" May 10 01:01:54.131000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.135559 kernel: kauditd_printk_skb: 78 callbacks suppressed May 10 01:01:54.135599 kernel: audit: type=1400 audit(1746838914.131:1000): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.135620 kernel: audit: type=1300 audit(1746838914.131:1000): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff1a8019b58 items=0 ppid=2522 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:54.131000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff1a8019b58 items=0 ppid=2522 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:54.139121 kernel: audit: type=1327 audit(1746838914.131:1000): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346561363966636331666664323864623332346230643538383466 May 10 01:01:54.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346561363966636331666664323864623332346230643538383466 May 10 01:01:54.142349 kernel: audit: type=1400 audit(1746838914.132:1001): avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.147041 kernel: audit: type=1400 audit(1746838914.132:1001): avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.147069 kernel: audit: type=1400 audit(1746838914.132:1001): avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.151875 kernel: audit: type=1400 audit(1746838914.132:1001): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.151903 kernel: audit: type=1400 audit(1746838914.132:1001): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.154313 kernel: audit: type=1400 audit(1746838914.132:1001): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.159270 kernel: audit: type=1400 audit(1746838914.132:1001): avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.132000 audit: BPF prog-id=142 op=LOAD May 10 01:01:54.132000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00034bba8 items=0 ppid=2522 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:54.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346561363966636331666664323864623332346230643538383466 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.141000 audit: BPF prog-id=143 op=LOAD May 10 01:01:54.141000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00034bbf8 items=0 ppid=2522 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:54.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346561363966636331666664323864623332346230643538383466 May 10 01:01:54.143000 audit: BPF prog-id=143 op=UNLOAD May 10 01:01:54.143000 audit: BPF prog-id=142 op=UNLOAD May 10 01:01:54.143000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:01:54.143000 audit: BPF prog-id=144 op=LOAD May 10 01:01:54.143000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00034bc88 items=0 ppid=2522 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:01:54.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346561363966636331666664323864623332346230643538383466 May 10 01:01:54.165045 env[1248]: time="2025-05-10T01:01:54.165025735Z" level=info msg="StartContainer for \"2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb\" returns successfully" May 10 01:01:54.222538 systemd[1]: cri-containerd-2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb.scope: Deactivated successfully. May 10 01:01:54.225000 audit: BPF prog-id=144 op=UNLOAD May 10 01:01:54.231579 env[1248]: time="2025-05-10T01:01:54.231548732Z" level=error msg="ExecSync for \"2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb\" failed" error="failed to exec in container: failed to create exec \"d17c6db2e6ca44c163061b6625392a9e9cd5116817beec6774dff2030aa1d765\": cannot exec in a stopped state: unknown" May 10 01:01:54.231784 kubelet[2100]: E0510 01:01:54.231711 2100 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: failed to create exec \"d17c6db2e6ca44c163061b6625392a9e9cd5116817beec6774dff2030aa1d765\": cannot exec in a stopped state: unknown" containerID="2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 01:01:54.238561 kubelet[2100]: I0510 01:01:54.236463 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-4gx8r" podStartSLOduration=18.95089893 podStartE2EDuration="37.236449105s" podCreationTimestamp="2025-05-10 01:01:17 +0000 UTC" firstStartedPulling="2025-05-10 01:01:18.269975483 +0000 UTC m=+11.301946061" lastFinishedPulling="2025-05-10 01:01:36.555525654 +0000 UTC m=+29.587496236" observedRunningTime="2025-05-10 01:01:37.267497976 +0000 UTC m=+30.299468561" watchObservedRunningTime="2025-05-10 01:01:54.236449105 +0000 UTC m=+47.268419695" May 10 01:01:54.250804 env[1248]: time="2025-05-10T01:01:54.250777382Z" level=info msg="shim disconnected" id=2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb May 10 01:01:54.250880 env[1248]: time="2025-05-10T01:01:54.250803765Z" level=warning msg="cleaning up after shim disconnected" id=2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb namespace=k8s.io May 10 01:01:54.250880 env[1248]: time="2025-05-10T01:01:54.250812843Z" level=info msg="cleaning up dead shim" May 10 01:01:54.250950 env[1248]: time="2025-05-10T01:01:54.250780879Z" level=error msg="ExecSync for \"2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"bda1b9ce5b946a2a59b192a8ee121ffd18f9be7f909d71033b44508986cfae54\": task 2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb not found: not found" May 10 01:01:54.251173 kubelet[2100]: E0510 01:01:54.251080 2100 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"bda1b9ce5b946a2a59b192a8ee121ffd18f9be7f909d71033b44508986cfae54\": task 2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb not found: not found" containerID="2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 01:01:54.251780 env[1248]: time="2025-05-10T01:01:54.251762350Z" level=error msg="ExecSync for \"2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb not found: not found" May 10 01:01:54.252013 kubelet[2100]: E0510 01:01:54.251874 2100 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb not found: not found" containerID="2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 10 01:01:54.256338 env[1248]: time="2025-05-10T01:01:54.256309245Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:01:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3565 runtime=io.containerd.runc.v2\n" May 10 01:01:55.075980 env[1248]: time="2025-05-10T01:01:55.075949945Z" level=info msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\"" May 10 01:01:55.083358 systemd[1]: run-containerd-runc-k8s.io-2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb-runc.8vCxCW.mount: Deactivated successfully. May 10 01:01:55.083438 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb-rootfs.mount: Deactivated successfully. May 10 01:01:55.096187 env[1248]: time="2025-05-10T01:01:55.096150276Z" level=error msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\" failed" error="failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:55.096413 kubelet[2100]: E0510 01:01:55.096366 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:01:55.096413 kubelet[2100]: E0510 01:01:55.096406 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6"} May 10 01:01:55.096471 kubelet[2100]: E0510 01:01:55.096426 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:55.096471 kubelet[2100]: E0510 01:01:55.096441 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" podUID="41128e7d-a5aa-4fe4-bf46-b5240a85e276" May 10 01:01:55.228890 kubelet[2100]: I0510 01:01:55.228865 2100 scope.go:117] "RemoveContainer" containerID="1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265" May 10 01:01:55.229151 kubelet[2100]: I0510 01:01:55.229129 2100 scope.go:117] "RemoveContainer" containerID="2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb" May 10 01:01:55.234365 kubelet[2100]: E0510 01:01:55.229218 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-4gx8r_calico-system(76aee3d8-2662-4b23-a26f-5cebe012bd82)\"" pod="calico-system/calico-node-4gx8r" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" May 10 01:01:55.234425 env[1248]: time="2025-05-10T01:01:55.231734861Z" level=info msg="RemoveContainer for \"1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265\"" May 10 01:01:55.234425 env[1248]: time="2025-05-10T01:01:55.233469450Z" level=info msg="RemoveContainer for \"1a10944408d85d30c3db4ff038ce754a1db22f7135744c48ca952d993eb04265\" returns successfully" May 10 01:01:56.232104 kubelet[2100]: I0510 01:01:56.232076 2100 scope.go:117] "RemoveContainer" containerID="2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb" May 10 01:01:56.232392 kubelet[2100]: E0510 01:01:56.232174 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-4gx8r_calico-system(76aee3d8-2662-4b23-a26f-5cebe012bd82)\"" pod="calico-system/calico-node-4gx8r" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" May 10 01:01:58.076326 env[1248]: time="2025-05-10T01:01:58.075649884Z" level=info msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\"" May 10 01:01:58.093635 env[1248]: time="2025-05-10T01:01:58.093595226Z" level=error msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\" failed" error="failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:58.093895 kubelet[2100]: E0510 01:01:58.093800 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:01:58.093895 kubelet[2100]: E0510 01:01:58.093833 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15"} May 10 01:01:58.093895 kubelet[2100]: E0510 01:01:58.093854 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:58.093895 kubelet[2100]: E0510 01:01:58.093867 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-smvpz" podUID="677c37f1-d746-4690-85e1-7fe9cdc46ac3" May 10 01:01:59.076838 env[1248]: time="2025-05-10T01:01:59.076804882Z" level=info msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\"" May 10 01:01:59.092766 env[1248]: time="2025-05-10T01:01:59.092727072Z" level=error msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\" failed" error="failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:01:59.092865 kubelet[2100]: E0510 01:01:59.092841 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:01:59.092904 kubelet[2100]: E0510 01:01:59.092873 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e"} May 10 01:01:59.092904 kubelet[2100]: E0510 01:01:59.092894 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:01:59.092974 kubelet[2100]: E0510 01:01:59.092908 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" podUID="4d0efb5e-e655-4540-9c5c-9c1ebcc357c2" May 10 01:02:01.605789 kubelet[2100]: I0510 01:02:01.605754 2100 scope.go:117] "RemoveContainer" containerID="2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb" May 10 01:02:01.606076 kubelet[2100]: E0510 01:02:01.605905 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-4gx8r_calico-system(76aee3d8-2662-4b23-a26f-5cebe012bd82)\"" pod="calico-system/calico-node-4gx8r" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" May 10 01:02:03.190000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.193066 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 01:02:03.193108 kernel: audit: type=1400 audit(1746838923.190:1007): avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.190000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.201027 kernel: audit: type=1400 audit(1746838923.190:1008): avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.201062 kernel: audit: type=1300 audit(1746838923.190:1008): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017b40a0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:02:03.190000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017b40a0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:02:03.205642 kernel: audit: type=1327 audit(1746838923.190:1008): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:02:03.190000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:02:03.190000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002458a50 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:02:03.213152 kernel: audit: type=1300 audit(1746838923.190:1007): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002458a50 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:02:03.213178 kernel: audit: type=1327 audit(1746838923.190:1007): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:02:03.190000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:02:03.979000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.979000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.988753 kernel: audit: type=1400 audit(1746838923.979:1009): avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.988797 kernel: audit: type=1400 audit(1746838923.979:1010): avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.979000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0115c0000 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:02:03.993805 kernel: audit: type=1300 audit(1746838923.979:1010): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0115c0000 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:02:03.993870 kernel: audit: type=1327 audit(1746838923.979:1010): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:02:03.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:02:03.979000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0113b1c80 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:02:03.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:02:03.995000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.995000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01185f0e0 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:02:03.995000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:02:03.996000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7301 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.996000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0115c0090 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:02:03.996000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:02:03.997000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.997000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c01185f880 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:02:03.997000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:02:03.998000 audit[1947]: AVC avc: denied { watch } for pid=1947 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:03.998000 audit[1947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0115c0270 a2=fc6 a3=0 items=0 ppid=1787 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c575 key=(null) May 10 01:02:03.998000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 10 01:02:06.076596 env[1248]: time="2025-05-10T01:02:06.076545884Z" level=info msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\"" May 10 01:02:06.099550 env[1248]: time="2025-05-10T01:02:06.099510602Z" level=error msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\" failed" error="failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:06.099811 kubelet[2100]: E0510 01:02:06.099775 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:02:06.100023 kubelet[2100]: E0510 01:02:06.099828 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf"} May 10 01:02:06.100023 kubelet[2100]: E0510 01:02:06.099855 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:06.100023 kubelet[2100]: E0510 01:02:06.099871 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qj7qn" podUID="6c7072c9-84f3-4473-ab9f-6d77c8d21e93" May 10 01:02:07.080559 env[1248]: time="2025-05-10T01:02:07.080524778Z" level=info msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\"" May 10 01:02:07.080774 env[1248]: time="2025-05-10T01:02:07.080708104Z" level=info msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\"" May 10 01:02:07.100923 env[1248]: time="2025-05-10T01:02:07.100884554Z" level=error msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\" failed" error="failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:07.101125 kubelet[2100]: E0510 01:02:07.101096 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:02:07.101310 kubelet[2100]: E0510 01:02:07.101143 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6"} May 10 01:02:07.101310 kubelet[2100]: E0510 01:02:07.101169 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:07.101310 kubelet[2100]: E0510 01:02:07.101183 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" podUID="41128e7d-a5aa-4fe4-bf46-b5240a85e276" May 10 01:02:07.105650 env[1248]: time="2025-05-10T01:02:07.105622748Z" level=error msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\" failed" error="failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:07.105828 kubelet[2100]: E0510 01:02:07.105752 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:02:07.105828 kubelet[2100]: E0510 01:02:07.105779 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442"} May 10 01:02:07.105828 kubelet[2100]: E0510 01:02:07.105796 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:07.105828 kubelet[2100]: E0510 01:02:07.105811 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:02:07.949000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:07.949000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017b4f80 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:02:07.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:02:07.949000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:07.949000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017b4fa0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:02:07.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:02:07.949000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:07.949000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018277a0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:02:07.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:02:07.949000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:02:07.949000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001827ac0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:02:07.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:02:08.316834 systemd[1]: Started sshd@7-139.178.70.100:22-139.178.89.65:46052.service. May 10 01:02:08.323176 kernel: kauditd_printk_skb: 26 callbacks suppressed May 10 01:02:08.323238 kernel: audit: type=1130 audit(1746838928.318:1019): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-139.178.89.65:46052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:08.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-139.178.89.65:46052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:08.385000 audit[3695]: USER_ACCT pid=3695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.392067 kernel: audit: type=1101 audit(1746838928.385:1020): pid=3695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.392120 kernel: audit: type=1103 audit(1746838928.390:1021): pid=3695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.390000 audit[3695]: CRED_ACQ pid=3695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.392196 sshd[3695]: Accepted publickey for core from 139.178.89.65 port 46052 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:08.391704 sshd[3695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:08.390000 audit[3695]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9236f30 a2=3 a3=0 items=0 ppid=1 pid=3695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:08.404828 kernel: audit: type=1006 audit(1746838928.390:1022): pid=3695 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 01:02:08.404865 kernel: audit: type=1300 audit(1746838928.390:1022): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9236f30 a2=3 a3=0 items=0 ppid=1 pid=3695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:08.390000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:08.406410 kernel: audit: type=1327 audit(1746838928.390:1022): proctitle=737368643A20636F7265205B707269765D May 10 01:02:08.407556 systemd-logind[1241]: New session 10 of user core. May 10 01:02:08.408061 systemd[1]: Started session-10.scope. May 10 01:02:08.409000 audit[3695]: USER_START pid=3695 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.415299 kernel: audit: type=1105 audit(1746838928.409:1023): pid=3695 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.414000 audit[3697]: CRED_ACQ pid=3697 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.418308 kernel: audit: type=1103 audit(1746838928.414:1024): pid=3697 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.824319 sshd[3695]: pam_unix(sshd:session): session closed for user core May 10 01:02:08.823000 audit[3695]: USER_END pid=3695 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.827000 audit[3695]: CRED_DISP pid=3695 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.831564 kernel: audit: type=1106 audit(1746838928.823:1025): pid=3695 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.832657 kernel: audit: type=1104 audit(1746838928.827:1026): pid=3695 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:08.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-139.178.89.65:46052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:08.831969 systemd[1]: sshd@7-139.178.70.100:22-139.178.89.65:46052.service: Deactivated successfully. May 10 01:02:08.832436 systemd[1]: session-10.scope: Deactivated successfully. May 10 01:02:08.832989 systemd-logind[1241]: Session 10 logged out. Waiting for processes to exit. May 10 01:02:08.833529 systemd-logind[1241]: Removed session 10. May 10 01:02:09.077067 env[1248]: time="2025-05-10T01:02:09.076532632Z" level=info msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\"" May 10 01:02:09.101685 env[1248]: time="2025-05-10T01:02:09.101651955Z" level=error msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\" failed" error="failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:09.102032 kubelet[2100]: E0510 01:02:09.101928 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:02:09.102032 kubelet[2100]: E0510 01:02:09.101962 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b"} May 10 01:02:09.102032 kubelet[2100]: E0510 01:02:09.101989 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:09.102032 kubelet[2100]: E0510 01:02:09.102011 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" podUID="6c24de29-5fd2-48e8-aadf-9db45ec25d51" May 10 01:02:11.076499 env[1248]: time="2025-05-10T01:02:11.076466856Z" level=info msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\"" May 10 01:02:11.093041 env[1248]: time="2025-05-10T01:02:11.093001278Z" level=error msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\" failed" error="failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:11.093269 kubelet[2100]: E0510 01:02:11.093185 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:02:11.093269 kubelet[2100]: E0510 01:02:11.093215 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15"} May 10 01:02:11.093269 kubelet[2100]: E0510 01:02:11.093235 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:11.093269 kubelet[2100]: E0510 01:02:11.093249 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-smvpz" podUID="677c37f1-d746-4690-85e1-7fe9cdc46ac3" May 10 01:02:13.828103 systemd[1]: Started sshd@8-139.178.70.100:22-139.178.89.65:46066.service. May 10 01:02:13.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-139.178.89.65:46066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:13.829810 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 01:02:13.833304 kernel: audit: type=1130 audit(1746838933.826:1028): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-139.178.89.65:46066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:13.876000 audit[3748]: USER_ACCT pid=3748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:13.879355 sshd[3748]: Accepted publickey for core from 139.178.89.65 port 46066 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:13.881000 audit[3748]: CRED_ACQ pid=3748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:13.883271 sshd[3748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:13.887004 kernel: audit: type=1101 audit(1746838933.876:1029): pid=3748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:13.887082 kernel: audit: type=1103 audit(1746838933.881:1030): pid=3748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:13.889657 kernel: audit: type=1006 audit(1746838933.881:1031): pid=3748 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 01:02:13.881000 audit[3748]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2a512860 a2=3 a3=0 items=0 ppid=1 pid=3748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:13.893997 kernel: audit: type=1300 audit(1746838933.881:1031): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2a512860 a2=3 a3=0 items=0 ppid=1 pid=3748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:13.894037 kernel: audit: type=1327 audit(1746838933.881:1031): proctitle=737368643A20636F7265205B707269765D May 10 01:02:13.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:13.897884 systemd-logind[1241]: New session 11 of user core. May 10 01:02:13.898471 systemd[1]: Started session-11.scope. May 10 01:02:13.900000 audit[3748]: USER_START pid=3748 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:13.900000 audit[3750]: CRED_ACQ pid=3750 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:13.908650 kernel: audit: type=1105 audit(1746838933.900:1032): pid=3748 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:13.908680 kernel: audit: type=1103 audit(1746838933.900:1033): pid=3750 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:14.028767 sshd[3748]: pam_unix(sshd:session): session closed for user core May 10 01:02:14.028000 audit[3748]: USER_END pid=3748 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:14.030537 systemd[1]: sshd@8-139.178.70.100:22-139.178.89.65:46066.service: Deactivated successfully. May 10 01:02:14.033323 kernel: audit: type=1106 audit(1746838934.028:1034): pid=3748 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:14.030994 systemd[1]: session-11.scope: Deactivated successfully. May 10 01:02:14.033655 systemd-logind[1241]: Session 11 logged out. Waiting for processes to exit. May 10 01:02:14.028000 audit[3748]: CRED_DISP pid=3748 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:14.037076 systemd-logind[1241]: Removed session 11. May 10 01:02:14.037301 kernel: audit: type=1104 audit(1746838934.028:1035): pid=3748 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:14.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-139.178.89.65:46066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:14.076401 env[1248]: time="2025-05-10T01:02:14.076377359Z" level=info msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\"" May 10 01:02:14.094585 env[1248]: time="2025-05-10T01:02:14.094498783Z" level=error msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\" failed" error="failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:14.095506 kubelet[2100]: E0510 01:02:14.095390 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:02:14.095506 kubelet[2100]: E0510 01:02:14.095438 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e"} May 10 01:02:14.095506 kubelet[2100]: E0510 01:02:14.095460 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:14.095506 kubelet[2100]: E0510 01:02:14.095482 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" podUID="4d0efb5e-e655-4540-9c5c-9c1ebcc357c2" May 10 01:02:16.075745 kubelet[2100]: I0510 01:02:16.075721 2100 scope.go:117] "RemoveContainer" containerID="2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb" May 10 01:02:16.077007 env[1248]: time="2025-05-10T01:02:16.076985975Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for container &ContainerMetadata{Name:calico-node,Attempt:3,}" May 10 01:02:16.157946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1472206916.mount: Deactivated successfully. May 10 01:02:16.184388 env[1248]: time="2025-05-10T01:02:16.184354656Z" level=info msg="CreateContainer within sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" for &ContainerMetadata{Name:calico-node,Attempt:3,} returns container id \"793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb\"" May 10 01:02:16.184809 env[1248]: time="2025-05-10T01:02:16.184787541Z" level=info msg="StartContainer for \"793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb\"" May 10 01:02:16.201053 systemd[1]: Started cri-containerd-793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb.scope. May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2e240fd8d8 items=0 ppid=2522 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:16.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739336262643230363266333130646234636266353233626438636534 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit: BPF prog-id=145 op=LOAD May 10 01:02:16.216000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000298218 items=0 ppid=2522 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:16.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739336262643230363266333130646234636266353233626438636534 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit: BPF prog-id=146 op=LOAD May 10 01:02:16.216000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000298268 items=0 ppid=2522 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:16.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739336262643230363266333130646234636266353233626438636534 May 10 01:02:16.216000 audit: BPF prog-id=146 op=UNLOAD May 10 01:02:16.216000 audit: BPF prog-id=145 op=UNLOAD May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { perfmon } for pid=3784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit[3784]: AVC avc: denied { bpf } for pid=3784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:16.216000 audit: BPF prog-id=147 op=LOAD May 10 01:02:16.216000 audit[3784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002982f8 items=0 ppid=2522 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:16.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739336262643230363266333130646234636266353233626438636534 May 10 01:02:16.229678 env[1248]: time="2025-05-10T01:02:16.229656826Z" level=info msg="StartContainer for \"793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb\" returns successfully" May 10 01:02:16.645135 systemd[1]: cri-containerd-793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb.scope: Deactivated successfully. May 10 01:02:16.648000 audit: BPF prog-id=147 op=UNLOAD May 10 01:02:16.657877 env[1248]: time="2025-05-10T01:02:16.657843301Z" level=info msg="shim disconnected" id=793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb May 10 01:02:16.657877 env[1248]: time="2025-05-10T01:02:16.657874620Z" level=warning msg="cleaning up after shim disconnected" id=793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb namespace=k8s.io May 10 01:02:16.657877 env[1248]: time="2025-05-10T01:02:16.657881533Z" level=info msg="cleaning up dead shim" May 10 01:02:16.663761 env[1248]: time="2025-05-10T01:02:16.663731525Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:02:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3850 runtime=io.containerd.runc.v2\n" May 10 01:02:17.154690 systemd[1]: run-containerd-runc-k8s.io-793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb-runc.k5dXjQ.mount: Deactivated successfully. May 10 01:02:17.154745 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb-rootfs.mount: Deactivated successfully. May 10 01:02:17.265695 kubelet[2100]: I0510 01:02:17.265668 2100 scope.go:117] "RemoveContainer" containerID="2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb" May 10 01:02:17.265980 kubelet[2100]: I0510 01:02:17.265932 2100 scope.go:117] "RemoveContainer" containerID="793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb" May 10 01:02:17.266043 kubelet[2100]: E0510 01:02:17.266021 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 40s restarting failed container=calico-node pod=calico-node-4gx8r_calico-system(76aee3d8-2662-4b23-a26f-5cebe012bd82)\"" pod="calico-system/calico-node-4gx8r" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" May 10 01:02:17.267028 env[1248]: time="2025-05-10T01:02:17.266996697Z" level=info msg="RemoveContainer for \"2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb\"" May 10 01:02:17.280714 env[1248]: time="2025-05-10T01:02:17.280670290Z" level=info msg="RemoveContainer for \"2b4ea69fcc1ffd28db324b0d5884fc0a5cc39cc03289ecc34f1ccb544efeafeb\" returns successfully" May 10 01:02:18.274140 kubelet[2100]: I0510 01:02:18.273996 2100 scope.go:117] "RemoveContainer" containerID="793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb" May 10 01:02:18.274140 kubelet[2100]: E0510 01:02:18.274099 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 40s restarting failed container=calico-node pod=calico-node-4gx8r_calico-system(76aee3d8-2662-4b23-a26f-5cebe012bd82)\"" pod="calico-system/calico-node-4gx8r" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" May 10 01:02:19.032495 systemd[1]: Started sshd@9-139.178.70.100:22-139.178.89.65:58134.service. May 10 01:02:19.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-139.178.89.65:58134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:19.038074 kernel: kauditd_printk_skb: 45 callbacks suppressed May 10 01:02:19.038128 kernel: audit: type=1130 audit(1746838939.031:1044): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-139.178.89.65:58134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:19.076469 env[1248]: time="2025-05-10T01:02:19.076432469Z" level=info msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\"" May 10 01:02:19.080000 audit[3864]: USER_ACCT pid=3864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.082031 sshd[3864]: Accepted publickey for core from 139.178.89.65 port 58134 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:19.086307 kernel: audit: type=1101 audit(1746838939.080:1045): pid=3864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.085000 audit[3864]: CRED_ACQ pid=3864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.087260 sshd[3864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:19.091347 kernel: audit: type=1103 audit(1746838939.085:1046): pid=3864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.094304 kernel: audit: type=1006 audit(1746838939.085:1047): pid=3864 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 10 01:02:19.095558 systemd-logind[1241]: New session 12 of user core. May 10 01:02:19.096315 systemd[1]: Started session-12.scope. May 10 01:02:19.085000 audit[3864]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe55a41980 a2=3 a3=0 items=0 ppid=1 pid=3864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:19.102218 kernel: audit: type=1300 audit(1746838939.085:1047): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe55a41980 a2=3 a3=0 items=0 ppid=1 pid=3864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.102268 kernel: audit: type=1327 audit(1746838939.085:1047): proctitle=737368643A20636F7265205B707269765D May 10 01:02:19.102000 audit[3864]: USER_START pid=3864 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.108310 kernel: audit: type=1105 audit(1746838939.102:1048): pid=3864 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.107000 audit[3884]: CRED_ACQ pid=3884 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.112309 kernel: audit: type=1103 audit(1746838939.107:1049): pid=3884 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.120658 env[1248]: time="2025-05-10T01:02:19.120616580Z" level=error msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\" failed" error="failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:19.120966 kubelet[2100]: E0510 01:02:19.120818 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:02:19.120966 kubelet[2100]: E0510 01:02:19.120896 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442"} May 10 01:02:19.120966 kubelet[2100]: E0510 01:02:19.120929 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:19.120966 kubelet[2100]: E0510 01:02:19.120946 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"496dec10-f9bd-4cc8-9fbd-5feb996d9abc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9qdlp" podUID="496dec10-f9bd-4cc8-9fbd-5feb996d9abc" May 10 01:02:19.206803 sshd[3864]: pam_unix(sshd:session): session closed for user core May 10 01:02:19.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.100:22-139.178.89.65:58138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:19.209112 systemd[1]: Started sshd@10-139.178.70.100:22-139.178.89.65:58138.service. May 10 01:02:19.212464 kernel: audit: type=1130 audit(1746838939.207:1050): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.100:22-139.178.89.65:58138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:19.211000 audit[3864]: USER_END pid=3864 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.217033 systemd[1]: sshd@9-139.178.70.100:22-139.178.89.65:58134.service: Deactivated successfully. May 10 01:02:19.217308 kernel: audit: type=1106 audit(1746838939.211:1051): pid=3864 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.217660 systemd[1]: session-12.scope: Deactivated successfully. May 10 01:02:19.212000 audit[3864]: CRED_DISP pid=3864 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-139.178.89.65:58134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:19.218144 systemd-logind[1241]: Session 12 logged out. Waiting for processes to exit. May 10 01:02:19.218829 systemd-logind[1241]: Removed session 12. May 10 01:02:19.251000 audit[3895]: USER_ACCT pid=3895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.252850 sshd[3895]: Accepted publickey for core from 139.178.89.65 port 58138 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:19.252000 audit[3895]: CRED_ACQ pid=3895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.252000 audit[3895]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd63485ac0 a2=3 a3=0 items=0 ppid=1 pid=3895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:19.253728 sshd[3895]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:19.256536 systemd[1]: Started session-13.scope. May 10 01:02:19.257273 systemd-logind[1241]: New session 13 of user core. May 10 01:02:19.259000 audit[3895]: USER_START pid=3895 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.260000 audit[3898]: CRED_ACQ pid=3898 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.272469 env[1248]: time="2025-05-10T01:02:19.272435821Z" level=info msg="StopPodSandbox for \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\"" May 10 01:02:19.272583 env[1248]: time="2025-05-10T01:02:19.272566822Z" level=info msg="Container to stop \"03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 01:02:19.272678 env[1248]: time="2025-05-10T01:02:19.272664609Z" level=info msg="Container to stop \"793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 01:02:19.272754 env[1248]: time="2025-05-10T01:02:19.272738633Z" level=info msg="Container to stop \"43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 01:02:19.274756 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43-shm.mount: Deactivated successfully. May 10 01:02:19.279000 audit: BPF prog-id=122 op=UNLOAD May 10 01:02:19.280947 systemd[1]: cri-containerd-f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43.scope: Deactivated successfully. May 10 01:02:19.284000 audit: BPF prog-id=125 op=UNLOAD May 10 01:02:19.294793 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43-rootfs.mount: Deactivated successfully. May 10 01:02:19.303149 env[1248]: time="2025-05-10T01:02:19.303117816Z" level=info msg="shim disconnected" id=f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43 May 10 01:02:19.303225 env[1248]: time="2025-05-10T01:02:19.303152292Z" level=warning msg="cleaning up after shim disconnected" id=f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43 namespace=k8s.io May 10 01:02:19.303225 env[1248]: time="2025-05-10T01:02:19.303159150Z" level=info msg="cleaning up dead shim" May 10 01:02:19.315117 env[1248]: time="2025-05-10T01:02:19.315089268Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:02:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3919 runtime=io.containerd.runc.v2\n" May 10 01:02:19.315513 env[1248]: time="2025-05-10T01:02:19.315496801Z" level=info msg="TearDown network for sandbox \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" successfully" May 10 01:02:19.315564 env[1248]: time="2025-05-10T01:02:19.315511938Z" level=info msg="StopPodSandbox for \"f4671fb85dabc2898013ee32f9203287d9107d3e2666d48d8cb93db19fbefd43\" returns successfully" May 10 01:02:19.340265 kubelet[2100]: E0510 01:02:19.340246 2100 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="install-cni" May 10 01:02:19.341333 kubelet[2100]: E0510 01:02:19.341324 2100 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="calico-node" May 10 01:02:19.341868 kubelet[2100]: E0510 01:02:19.341460 2100 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="calico-node" May 10 01:02:19.341868 kubelet[2100]: E0510 01:02:19.341468 2100 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="calico-node" May 10 01:02:19.341868 kubelet[2100]: E0510 01:02:19.341473 2100 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="flexvol-driver" May 10 01:02:19.341868 kubelet[2100]: I0510 01:02:19.341497 2100 memory_manager.go:354] "RemoveStaleState removing state" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="calico-node" May 10 01:02:19.341868 kubelet[2100]: I0510 01:02:19.341501 2100 memory_manager.go:354] "RemoveStaleState removing state" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="calico-node" May 10 01:02:19.341868 kubelet[2100]: E0510 01:02:19.341517 2100 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="calico-node" May 10 01:02:19.341868 kubelet[2100]: I0510 01:02:19.341529 2100 memory_manager.go:354] "RemoveStaleState removing state" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="calico-node" May 10 01:02:19.341868 kubelet[2100]: I0510 01:02:19.341549 2100 memory_manager.go:354] "RemoveStaleState removing state" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" containerName="calico-node" May 10 01:02:19.343178 kubelet[2100]: I0510 01:02:19.340574 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-log-dir\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.343277 kubelet[2100]: I0510 01:02:19.343267 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-policysync\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.343361 kubelet[2100]: I0510 01:02:19.343350 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-lib-modules\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.343420 kubelet[2100]: I0510 01:02:19.343411 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-whk6m\" (UniqueName: \"kubernetes.io/projected/76aee3d8-2662-4b23-a26f-5cebe012bd82-kube-api-access-whk6m\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.348915 kubelet[2100]: I0510 01:02:19.348902 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-net-dir\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.349020 kubelet[2100]: I0510 01:02:19.349011 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-var-run-calico\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.349084 kubelet[2100]: I0510 01:02:19.349076 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/76aee3d8-2662-4b23-a26f-5cebe012bd82-tigera-ca-bundle\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.349142 kubelet[2100]: I0510 01:02:19.349132 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-bin-dir\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.349194 kubelet[2100]: I0510 01:02:19.349185 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-flexvol-driver-host\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.349245 kubelet[2100]: I0510 01:02:19.349236 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-xtables-lock\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.349306 kubelet[2100]: I0510 01:02:19.349298 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/76aee3d8-2662-4b23-a26f-5cebe012bd82-node-certs\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.349366 kubelet[2100]: I0510 01:02:19.349358 2100 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-var-lib-calico\") pod \"76aee3d8-2662-4b23-a26f-5cebe012bd82\" (UID: \"76aee3d8-2662-4b23-a26f-5cebe012bd82\") " May 10 01:02:19.350222 kubelet[2100]: I0510 01:02:19.346210 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-policysync" (OuterVolumeSpecName: "policysync") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.350310 kubelet[2100]: I0510 01:02:19.348796 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.350367 kubelet[2100]: I0510 01:02:19.349444 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.350425 kubelet[2100]: I0510 01:02:19.350415 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.350483 kubelet[2100]: I0510 01:02:19.350474 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.355425 systemd[1]: var-lib-kubelet-pods-76aee3d8\x2d2662\x2d4b23\x2da26f\x2d5cebe012bd82-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 10 01:02:19.356859 systemd[1]: var-lib-kubelet-pods-76aee3d8\x2d2662\x2d4b23\x2da26f\x2d5cebe012bd82-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwhk6m.mount: Deactivated successfully. May 10 01:02:19.358599 kubelet[2100]: I0510 01:02:19.358580 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/76aee3d8-2662-4b23-a26f-5cebe012bd82-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 01:02:19.358695 kubelet[2100]: I0510 01:02:19.358682 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.358755 kubelet[2100]: I0510 01:02:19.358745 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.358910 kubelet[2100]: I0510 01:02:19.358900 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.359055 kubelet[2100]: I0510 01:02:19.359044 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/76aee3d8-2662-4b23-a26f-5cebe012bd82-kube-api-access-whk6m" (OuterVolumeSpecName: "kube-api-access-whk6m") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "kube-api-access-whk6m". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 01:02:19.359111 kubelet[2100]: I0510 01:02:19.359100 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 01:02:19.363296 systemd[1]: Created slice kubepods-besteffort-pod8c9f7225_afff_4fe5_85dd_6ca5f0c73561.slice. May 10 01:02:19.369584 systemd[1]: var-lib-kubelet-pods-76aee3d8\x2d2662\x2d4b23\x2da26f\x2d5cebe012bd82-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 10 01:02:19.371201 kubelet[2100]: I0510 01:02:19.371183 2100 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/76aee3d8-2662-4b23-a26f-5cebe012bd82-node-certs" (OuterVolumeSpecName: "node-certs") pod "76aee3d8-2662-4b23-a26f-5cebe012bd82" (UID: "76aee3d8-2662-4b23-a26f-5cebe012bd82"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 01:02:19.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.100:22-139.178.89.65:58152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:19.423464 systemd[1]: Started sshd@11-139.178.70.100:22-139.178.89.65:58152.service. May 10 01:02:19.422192 sshd[3895]: pam_unix(sshd:session): session closed for user core May 10 01:02:19.423000 audit[3895]: USER_END pid=3895 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.423000 audit[3895]: CRED_DISP pid=3895 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.100:22-139.178.89.65:58138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:19.426776 systemd[1]: sshd@10-139.178.70.100:22-139.178.89.65:58138.service: Deactivated successfully. May 10 01:02:19.427220 systemd[1]: session-13.scope: Deactivated successfully. May 10 01:02:19.428001 systemd-logind[1241]: Session 13 logged out. Waiting for processes to exit. May 10 01:02:19.428695 systemd-logind[1241]: Removed session 13. May 10 01:02:19.450421 kubelet[2100]: I0510 01:02:19.450401 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-xtables-lock\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.450558 kubelet[2100]: I0510 01:02:19.450544 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-node-certs\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.450621 kubelet[2100]: I0510 01:02:19.450612 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-cni-log-dir\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.450680 kubelet[2100]: I0510 01:02:19.450671 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-tigera-ca-bundle\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.450749 kubelet[2100]: I0510 01:02:19.450739 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-policysync\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.450806 kubelet[2100]: I0510 01:02:19.450797 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fvmzl\" (UniqueName: \"kubernetes.io/projected/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-kube-api-access-fvmzl\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.450865 kubelet[2100]: I0510 01:02:19.450856 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-cni-net-dir\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.450936 kubelet[2100]: I0510 01:02:19.450927 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-var-run-calico\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.450991 kubelet[2100]: I0510 01:02:19.450983 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-cni-bin-dir\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.451102 kubelet[2100]: I0510 01:02:19.451093 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-flexvol-driver-host\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.451160 kubelet[2100]: I0510 01:02:19.451148 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-var-lib-calico\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.451223 kubelet[2100]: I0510 01:02:19.451214 2100 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8c9f7225-afff-4fe5-85dd-6ca5f0c73561-lib-modules\") pod \"calico-node-sbf7m\" (UID: \"8c9f7225-afff-4fe5-85dd-6ca5f0c73561\") " pod="calico-system/calico-node-sbf7m" May 10 01:02:19.451281 kubelet[2100]: I0510 01:02:19.451273 2100 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-whk6m\" (UniqueName: \"kubernetes.io/projected/76aee3d8-2662-4b23-a26f-5cebe012bd82-kube-api-access-whk6m\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451348 kubelet[2100]: I0510 01:02:19.451340 2100 reconciler_common.go:288] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-policysync\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451399 kubelet[2100]: I0510 01:02:19.451390 2100 reconciler_common.go:288] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-lib-modules\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451447 kubelet[2100]: I0510 01:02:19.451439 2100 reconciler_common.go:288] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-var-run-calico\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451492 kubelet[2100]: I0510 01:02:19.451485 2100 reconciler_common.go:288] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-net-dir\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451541 kubelet[2100]: I0510 01:02:19.451534 2100 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/76aee3d8-2662-4b23-a26f-5cebe012bd82-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451590 kubelet[2100]: I0510 01:02:19.451582 2100 reconciler_common.go:288] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451638 kubelet[2100]: I0510 01:02:19.451631 2100 reconciler_common.go:288] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/76aee3d8-2662-4b23-a26f-5cebe012bd82-node-certs\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451688 kubelet[2100]: I0510 01:02:19.451681 2100 reconciler_common.go:288] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-var-lib-calico\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451736 kubelet[2100]: I0510 01:02:19.451728 2100 reconciler_common.go:288] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451807 kubelet[2100]: I0510 01:02:19.451800 2100 reconciler_common.go:288] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-xtables-lock\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.451867 kubelet[2100]: I0510 01:02:19.451859 2100 reconciler_common.go:288] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/76aee3d8-2662-4b23-a26f-5cebe012bd82-cni-log-dir\") on node \"localhost\" DevicePath \"\"" May 10 01:02:19.470000 audit[3938]: USER_ACCT pid=3938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.471652 sshd[3938]: Accepted publickey for core from 139.178.89.65 port 58152 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:19.471000 audit[3938]: CRED_ACQ pid=3938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.471000 audit[3938]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9713060 a2=3 a3=0 items=0 ppid=1 pid=3938 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:19.472729 sshd[3938]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:19.475980 systemd[1]: Started session-14.scope. May 10 01:02:19.476379 systemd-logind[1241]: New session 14 of user core. May 10 01:02:19.478000 audit[3938]: USER_START pid=3938 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.479000 audit[3941]: CRED_ACQ pid=3941 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.595420 sshd[3938]: pam_unix(sshd:session): session closed for user core May 10 01:02:19.596000 audit[3938]: USER_END pid=3938 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.596000 audit[3938]: CRED_DISP pid=3938 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:19.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.100:22-139.178.89.65:58152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:19.603644 systemd[1]: sshd@11-139.178.70.100:22-139.178.89.65:58152.service: Deactivated successfully. May 10 01:02:19.604118 systemd[1]: session-14.scope: Deactivated successfully. May 10 01:02:19.604878 systemd-logind[1241]: Session 14 logged out. Waiting for processes to exit. May 10 01:02:19.605346 systemd-logind[1241]: Removed session 14. May 10 01:02:19.666026 env[1248]: time="2025-05-10T01:02:19.665995951Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-sbf7m,Uid:8c9f7225-afff-4fe5-85dd-6ca5f0c73561,Namespace:calico-system,Attempt:0,}" May 10 01:02:19.672332 env[1248]: time="2025-05-10T01:02:19.672179261Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:02:19.672332 env[1248]: time="2025-05-10T01:02:19.672213431Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:02:19.672332 env[1248]: time="2025-05-10T01:02:19.672220419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:02:19.673010 env[1248]: time="2025-05-10T01:02:19.672416373Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0 pid=3960 runtime=io.containerd.runc.v2 May 10 01:02:19.679543 systemd[1]: Started cri-containerd-59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0.scope. May 10 01:02:19.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit: BPF prog-id=148 op=LOAD May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3960 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539613137633737646461393539623639616162333834616231623237 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3960 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539613137633737646461393539623639616162333834616231623237 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit: BPF prog-id=149 op=LOAD May 10 01:02:19.690000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000311360 items=0 ppid=3960 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539613137633737646461393539623639616162333834616231623237 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit: BPF prog-id=150 op=LOAD May 10 01:02:19.690000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003113a8 items=0 ppid=3960 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539613137633737646461393539623639616162333834616231623237 May 10 01:02:19.690000 audit: BPF prog-id=150 op=UNLOAD May 10 01:02:19.690000 audit: BPF prog-id=149 op=UNLOAD May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { perfmon } for pid=3969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit[3969]: AVC avc: denied { bpf } for pid=3969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.690000 audit: BPF prog-id=151 op=LOAD May 10 01:02:19.690000 audit[3969]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003117b8 items=0 ppid=3960 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539613137633737646461393539623639616162333834616231623237 May 10 01:02:19.698720 env[1248]: time="2025-05-10T01:02:19.698693637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-sbf7m,Uid:8c9f7225-afff-4fe5-85dd-6ca5f0c73561,Namespace:calico-system,Attempt:0,} returns sandbox id \"59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0\"" May 10 01:02:19.700551 env[1248]: time="2025-05-10T01:02:19.700062243Z" level=info msg="CreateContainer within sandbox \"59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 01:02:19.710963 env[1248]: time="2025-05-10T01:02:19.710867958Z" level=info msg="CreateContainer within sandbox \"59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1ed2a13f16c6014b467a14664a3c116a064497978dc234e5b2f966f7a56eab82\"" May 10 01:02:19.711988 env[1248]: time="2025-05-10T01:02:19.711330746Z" level=info msg="StartContainer for \"1ed2a13f16c6014b467a14664a3c116a064497978dc234e5b2f966f7a56eab82\"" May 10 01:02:19.728110 systemd[1]: Started cri-containerd-1ed2a13f16c6014b467a14664a3c116a064497978dc234e5b2f966f7a56eab82.scope. May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=7f6e355f7a18 items=0 ppid=3960 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165643261313366313663363031346234363761313436363461336331 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit: BPF prog-id=152 op=LOAD May 10 01:02:19.737000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfba8 items=0 ppid=3960 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165643261313366313663363031346234363761313436363461336331 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit: BPF prog-id=153 op=LOAD May 10 01:02:19.737000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfbf8 items=0 ppid=3960 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165643261313366313663363031346234363761313436363461336331 May 10 01:02:19.737000 audit: BPF prog-id=153 op=UNLOAD May 10 01:02:19.737000 audit: BPF prog-id=152 op=UNLOAD May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:19.737000 audit: BPF prog-id=154 op=LOAD May 10 01:02:19.737000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000dfc88 items=0 ppid=3960 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:19.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165643261313366313663363031346234363761313436363461336331 May 10 01:02:19.748123 env[1248]: time="2025-05-10T01:02:19.748096556Z" level=info msg="StartContainer for \"1ed2a13f16c6014b467a14664a3c116a064497978dc234e5b2f966f7a56eab82\" returns successfully" May 10 01:02:19.888813 systemd[1]: cri-containerd-1ed2a13f16c6014b467a14664a3c116a064497978dc234e5b2f966f7a56eab82.scope: Deactivated successfully. May 10 01:02:19.892000 audit: BPF prog-id=154 op=UNLOAD May 10 01:02:20.076339 env[1248]: time="2025-05-10T01:02:20.076303104Z" level=info msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\"" May 10 01:02:20.095958 env[1248]: time="2025-05-10T01:02:20.095895723Z" level=error msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\" failed" error="failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:20.096271 kubelet[2100]: E0510 01:02:20.096051 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:02:20.096271 kubelet[2100]: E0510 01:02:20.096084 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf"} May 10 01:02:20.096271 kubelet[2100]: E0510 01:02:20.096109 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:20.096271 kubelet[2100]: E0510 01:02:20.096125 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c7072c9-84f3-4473-ab9f-6d77c8d21e93\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qj7qn" podUID="6c7072c9-84f3-4473-ab9f-6d77c8d21e93" May 10 01:02:20.279410 kubelet[2100]: I0510 01:02:20.279390 2100 scope.go:117] "RemoveContainer" containerID="793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb" May 10 01:02:20.280126 env[1248]: time="2025-05-10T01:02:20.280108256Z" level=info msg="RemoveContainer for \"793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb\"" May 10 01:02:20.287803 systemd[1]: Removed slice kubepods-besteffort-pod76aee3d8_2662_4b23_a26f_5cebe012bd82.slice. May 10 01:02:20.310268 env[1248]: time="2025-05-10T01:02:20.310235037Z" level=info msg="RemoveContainer for \"793bbd2062f310db4cbf523bd8ce48b6e2fd7c0f277ebcf5517cefd71f9784bb\" returns successfully" May 10 01:02:20.311075 kubelet[2100]: I0510 01:02:20.310547 2100 scope.go:117] "RemoveContainer" containerID="03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc" May 10 01:02:20.319306 env[1248]: time="2025-05-10T01:02:20.319264656Z" level=info msg="RemoveContainer for \"03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc\"" May 10 01:02:20.354833 env[1248]: time="2025-05-10T01:02:20.354803686Z" level=info msg="RemoveContainer for \"03219f7d4a90d4ce5db4de1e8743c6934b4b153cc0a8416bc898b744578f19dc\" returns successfully" May 10 01:02:20.355115 kubelet[2100]: I0510 01:02:20.355085 2100 scope.go:117] "RemoveContainer" containerID="43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8" May 10 01:02:20.359642 env[1248]: time="2025-05-10T01:02:20.359621379Z" level=info msg="RemoveContainer for \"43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8\"" May 10 01:02:20.382427 env[1248]: time="2025-05-10T01:02:20.382406026Z" level=info msg="RemoveContainer for \"43d26c65878835490d00be6d98888f53145932f6236e82f144cb0289ebe364a8\" returns successfully" May 10 01:02:20.388831 env[1248]: time="2025-05-10T01:02:20.388800314Z" level=info msg="shim disconnected" id=1ed2a13f16c6014b467a14664a3c116a064497978dc234e5b2f966f7a56eab82 May 10 01:02:20.388887 env[1248]: time="2025-05-10T01:02:20.388830906Z" level=warning msg="cleaning up after shim disconnected" id=1ed2a13f16c6014b467a14664a3c116a064497978dc234e5b2f966f7a56eab82 namespace=k8s.io May 10 01:02:20.388887 env[1248]: time="2025-05-10T01:02:20.388839252Z" level=info msg="cleaning up dead shim" May 10 01:02:20.394769 env[1248]: time="2025-05-10T01:02:20.394740957Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:02:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4067 runtime=io.containerd.runc.v2\n" May 10 01:02:21.076735 env[1248]: time="2025-05-10T01:02:21.076711334Z" level=info msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\"" May 10 01:02:21.077101 env[1248]: time="2025-05-10T01:02:21.076711334Z" level=info msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\"" May 10 01:02:21.077336 kubelet[2100]: I0510 01:02:21.077319 2100 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="76aee3d8-2662-4b23-a26f-5cebe012bd82" path="/var/lib/kubelet/pods/76aee3d8-2662-4b23-a26f-5cebe012bd82/volumes" May 10 01:02:21.095989 env[1248]: time="2025-05-10T01:02:21.095918228Z" level=error msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\" failed" error="failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:21.096495 kubelet[2100]: E0510 01:02:21.096400 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:02:21.096495 kubelet[2100]: E0510 01:02:21.096430 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6"} May 10 01:02:21.096495 kubelet[2100]: E0510 01:02:21.096450 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:21.096495 kubelet[2100]: E0510 01:02:21.096466 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"41128e7d-a5aa-4fe4-bf46-b5240a85e276\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" podUID="41128e7d-a5aa-4fe4-bf46-b5240a85e276" May 10 01:02:21.103887 env[1248]: time="2025-05-10T01:02:21.103862001Z" level=error msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\" failed" error="failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:21.104055 kubelet[2100]: E0510 01:02:21.103981 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:02:21.104055 kubelet[2100]: E0510 01:02:21.104002 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b"} May 10 01:02:21.104055 kubelet[2100]: E0510 01:02:21.104020 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:21.104055 kubelet[2100]: E0510 01:02:21.104030 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c24de29-5fd2-48e8-aadf-9db45ec25d51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" podUID="6c24de29-5fd2-48e8-aadf-9db45ec25d51" May 10 01:02:21.287309 env[1248]: time="2025-05-10T01:02:21.285774921Z" level=info msg="CreateContainer within sandbox \"59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 01:02:21.298785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3722899613.mount: Deactivated successfully. May 10 01:02:21.302156 env[1248]: time="2025-05-10T01:02:21.302129021Z" level=info msg="CreateContainer within sandbox \"59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da\"" May 10 01:02:21.303376 env[1248]: time="2025-05-10T01:02:21.303341783Z" level=info msg="StartContainer for \"0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da\"" May 10 01:02:21.323258 systemd[1]: Started cri-containerd-0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da.scope. May 10 01:02:21.326746 systemd[1]: run-containerd-runc-k8s.io-0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da-runc.zhuOHy.mount: Deactivated successfully. May 10 01:02:21.348000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.348000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f71a2719be8 items=0 ppid=3960 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:21.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166353435633235346161316566326462346661336136313165 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit: BPF prog-id=155 op=LOAD May 10 01:02:21.349000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000349b88 items=0 ppid=3960 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:21.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166353435633235346161316566326462346661336136313165 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.349000 audit: BPF prog-id=156 op=LOAD May 10 01:02:21.349000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000349bd8 items=0 ppid=3960 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:21.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166353435633235346161316566326462346661336136313165 May 10 01:02:21.350000 audit: BPF prog-id=156 op=UNLOAD May 10 01:02:21.350000 audit: BPF prog-id=155 op=UNLOAD May 10 01:02:21.350000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:21.350000 audit: BPF prog-id=157 op=LOAD May 10 01:02:21.350000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000349c68 items=0 ppid=3960 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:21.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313166353435633235346161316566326462346661336136313165 May 10 01:02:21.360127 env[1248]: time="2025-05-10T01:02:21.360103382Z" level=info msg="StartContainer for \"0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da\" returns successfully" May 10 01:02:23.076224 env[1248]: time="2025-05-10T01:02:23.076193246Z" level=info msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\"" May 10 01:02:23.268256 env[1248]: time="2025-05-10T01:02:23.268217249Z" level=error msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\" failed" error="failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 01:02:23.268661 kubelet[2100]: E0510 01:02:23.268541 2100 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:02:23.268661 kubelet[2100]: E0510 01:02:23.268585 2100 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15"} May 10 01:02:23.268661 kubelet[2100]: E0510 01:02:23.268620 2100 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 01:02:23.268661 kubelet[2100]: E0510 01:02:23.268637 2100 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"677c37f1-d746-4690-85e1-7fe9cdc46ac3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-smvpz" podUID="677c37f1-d746-4690-85e1-7fe9cdc46ac3" May 10 01:02:23.807221 env[1248]: time="2025-05-10T01:02:23.807169336Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 10 01:02:23.807429 env[1248]: time="2025-05-10T01:02:23.807405354Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 10 01:02:23.807602 env[1248]: time="2025-05-10T01:02:23.807585510Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/10-calico.conflist\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 10 01:02:23.809561 systemd[1]: cri-containerd-0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da.scope: Deactivated successfully. May 10 01:02:23.812000 audit: BPF prog-id=157 op=UNLOAD May 10 01:02:23.823322 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da-rootfs.mount: Deactivated successfully. May 10 01:02:23.826072 env[1248]: time="2025-05-10T01:02:23.826042570Z" level=info msg="shim disconnected" id=0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da May 10 01:02:23.826205 env[1248]: time="2025-05-10T01:02:23.826194188Z" level=warning msg="cleaning up after shim disconnected" id=0e11f545c254aa1ef2db4fa3a611e4d96f90d0babf4a43e3ab1cb3faf0b5c4da namespace=k8s.io May 10 01:02:23.826279 env[1248]: time="2025-05-10T01:02:23.826269868Z" level=info msg="cleaning up dead shim" May 10 01:02:23.830880 env[1248]: time="2025-05-10T01:02:23.830860651Z" level=warning msg="cleanup warnings time=\"2025-05-10T01:02:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4190 runtime=io.containerd.runc.v2\n" May 10 01:02:24.305436 env[1248]: time="2025-05-10T01:02:24.305410948Z" level=info msg="CreateContainer within sandbox \"59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 01:02:24.312121 env[1248]: time="2025-05-10T01:02:24.312099980Z" level=info msg="CreateContainer within sandbox \"59a17c77dda959b69aab384ab1b270a0107c768b90080b425e2da0f10372b9e0\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a42c271356d2ca2b6abb7ad6e4664d1c1d39c4bddeac11b9a39ec6b8ccd88916\"" May 10 01:02:24.312553 env[1248]: time="2025-05-10T01:02:24.312539217Z" level=info msg="StartContainer for \"a42c271356d2ca2b6abb7ad6e4664d1c1d39c4bddeac11b9a39ec6b8ccd88916\"" May 10 01:02:24.324577 systemd[1]: Started cri-containerd-a42c271356d2ca2b6abb7ad6e4664d1c1d39c4bddeac11b9a39ec6b8ccd88916.scope. May 10 01:02:24.344349 kernel: kauditd_printk_skb: 170 callbacks suppressed May 10 01:02:24.344428 kernel: audit: type=1400 audit(1746838944.336:1105): avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.344455 kernel: audit: type=1300 audit(1746838944.336:1105): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f6c4eb077c8 items=0 ppid=3960 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:24.336000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f6c4eb077c8 items=0 ppid=3960 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:24.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134326332373133353664326361326236616262376164366534363634 May 10 01:02:24.348088 kernel: audit: type=1327 audit(1746838944.336:1105): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134326332373133353664326361326236616262376164366534363634 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.353318 kernel: audit: type=1400 audit(1746838944.336:1106): avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.353353 kernel: audit: type=1400 audit(1746838944.336:1106): avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.357305 kernel: audit: type=1400 audit(1746838944.336:1106): avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.361305 kernel: audit: type=1400 audit(1746838944.336:1106): avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.364302 kernel: audit: type=1400 audit(1746838944.336:1106): avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.369803 kernel: audit: type=1400 audit(1746838944.336:1106): avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.369838 kernel: audit: type=1400 audit(1746838944.336:1106): avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.336000 audit: BPF prog-id=158 op=LOAD May 10 01:02:24.336000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c00032fbd8 items=0 ppid=3960 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:24.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134326332373133353664326361326236616262376164366534363634 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.337000 audit: BPF prog-id=159 op=LOAD May 10 01:02:24.337000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c00032fc28 items=0 ppid=3960 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:24.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134326332373133353664326361326236616262376164366534363634 May 10 01:02:24.343000 audit: BPF prog-id=159 op=UNLOAD May 10 01:02:24.343000 audit: BPF prog-id=158 op=UNLOAD May 10 01:02:24.343000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:24.343000 audit: BPF prog-id=160 op=LOAD May 10 01:02:24.343000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c00032fcb8 items=0 ppid=3960 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:24.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134326332373133353664326361326236616262376164366534363634 May 10 01:02:24.371361 env[1248]: time="2025-05-10T01:02:24.371331584Z" level=info msg="StartContainer for \"a42c271356d2ca2b6abb7ad6e4664d1c1d39c4bddeac11b9a39ec6b8ccd88916\" returns successfully" May 10 01:02:24.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.100:22-139.178.89.65:58158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:24.599720 systemd[1]: Started sshd@12-139.178.70.100:22-139.178.89.65:58158.service. May 10 01:02:24.680319 sshd[4252]: Accepted publickey for core from 139.178.89.65 port 58158 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:24.678000 audit[4252]: USER_ACCT pid=4252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:24.679000 audit[4252]: CRED_ACQ pid=4252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:24.679000 audit[4252]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaf2d9190 a2=3 a3=0 items=0 ppid=1 pid=4252 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:24.679000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:24.682219 sshd[4252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:24.688309 systemd[1]: Started session-15.scope. May 10 01:02:24.688929 systemd-logind[1241]: New session 15 of user core. May 10 01:02:24.691000 audit[4252]: USER_START pid=4252 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:24.692000 audit[4254]: CRED_ACQ pid=4254 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:24.945442 sshd[4252]: pam_unix(sshd:session): session closed for user core May 10 01:02:24.945000 audit[4252]: USER_END pid=4252 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:24.945000 audit[4252]: CRED_DISP pid=4252 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:24.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.100:22-139.178.89.65:58158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:24.947415 systemd[1]: sshd@12-139.178.70.100:22-139.178.89.65:58158.service: Deactivated successfully. May 10 01:02:24.947843 systemd[1]: session-15.scope: Deactivated successfully. May 10 01:02:24.948606 systemd-logind[1241]: Session 15 logged out. Waiting for processes to exit. May 10 01:02:24.949216 systemd-logind[1241]: Removed session 15. May 10 01:02:25.313993 systemd[1]: run-containerd-runc-k8s.io-a42c271356d2ca2b6abb7ad6e4664d1c1d39c4bddeac11b9a39ec6b8ccd88916-runc.iodj5G.mount: Deactivated successfully. May 10 01:02:25.888000 audit[4369]: AVC avc: denied { write } for pid=4369 comm="tee" name="fd" dev="proc" ino=38226 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:02:25.889000 audit[4367]: AVC avc: denied { write } for pid=4367 comm="tee" name="fd" dev="proc" ino=38229 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:02:25.889000 audit[4367]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5a480a2e a2=241 a3=1b6 items=1 ppid=4316 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:25.889000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 01:02:25.889000 audit: PATH item=0 name="/dev/fd/63" inode=38220 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:02:25.889000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:02:25.888000 audit[4369]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2060aa2e a2=241 a3=1b6 items=1 ppid=4308 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:25.888000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 01:02:25.888000 audit: PATH item=0 name="/dev/fd/63" inode=38221 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:02:25.888000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:02:25.895000 audit[4361]: AVC avc: denied { write } for pid=4361 comm="tee" name="fd" dev="proc" ino=38234 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:02:25.895000 audit[4361]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8d1c1a2e a2=241 a3=1b6 items=1 ppid=4315 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:25.898000 audit[4363]: AVC avc: denied { write } for pid=4363 comm="tee" name="fd" dev="proc" ino=38238 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:02:25.899000 audit[4365]: AVC avc: denied { write } for pid=4365 comm="tee" name="fd" dev="proc" ino=38242 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:02:25.899000 audit[4365]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa2786a1f a2=241 a3=1b6 items=1 ppid=4306 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:25.899000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 01:02:25.899000 audit: PATH item=0 name="/dev/fd/63" inode=39100 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:02:25.899000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:02:25.895000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 01:02:25.895000 audit: PATH item=0 name="/dev/fd/63" inode=39098 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:02:25.895000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:02:25.898000 audit[4363]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf5b89a30 a2=241 a3=1b6 items=1 ppid=4309 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:25.898000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 01:02:25.898000 audit: PATH item=0 name="/dev/fd/63" inode=39099 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:02:25.898000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:02:25.907000 audit[4371]: AVC avc: denied { write } for pid=4371 comm="tee" name="fd" dev="proc" ino=38252 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:02:25.907000 audit[4371]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc46644a2f a2=241 a3=1b6 items=1 ppid=4305 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:25.907000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 01:02:25.907000 audit: PATH item=0 name="/dev/fd/63" inode=39101 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:02:25.907000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:02:25.923000 audit[4373]: AVC avc: denied { write } for pid=4373 comm="tee" name="fd" dev="proc" ino=38281 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 01:02:25.923000 audit[4373]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3c6d9a1e a2=241 a3=1b6 items=1 ppid=4319 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:25.923000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 01:02:25.923000 audit: PATH item=0 name="/dev/fd/63" inode=39102 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 01:02:25.923000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.016000 audit: BPF prog-id=161 op=LOAD May 10 01:02:26.016000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6887a350 a2=98 a3=3 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.016000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.016000 audit: BPF prog-id=161 op=UNLOAD May 10 01:02:26.018000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit: BPF prog-id=162 op=LOAD May 10 01:02:26.018000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe6887a130 a2=74 a3=540051 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.018000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.018000 audit: BPF prog-id=162 op=UNLOAD May 10 01:02:26.018000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.018000 audit: BPF prog-id=163 op=LOAD May 10 01:02:26.018000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe6887a160 a2=94 a3=2 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.018000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.018000 audit: BPF prog-id=163 op=UNLOAD May 10 01:02:26.087000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.087000 audit: BPF prog-id=164 op=LOAD May 10 01:02:26.087000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe6887a020 a2=40 a3=1 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.087000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.088000 audit: BPF prog-id=164 op=UNLOAD May 10 01:02:26.088000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.088000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe6887a0f0 a2=50 a3=7ffe6887a1d0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.088000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6887a030 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6887a060 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe68879f70 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6887a080 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6887a060 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6887a050 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6887a080 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6887a060 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6887a080 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6887a050 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6887a0c0 a2=28 a3=0 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe68879e70 a2=50 a3=1 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit: BPF prog-id=165 op=LOAD May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe68879e70 a2=94 a3=5 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit: BPF prog-id=165 op=UNLOAD May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe68879f20 a2=50 a3=1 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe6887a040 a2=4 a3=38 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { confidentiality } for pid=4414 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe6887a090 a2=94 a3=6 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.095000 audit[4414]: AVC avc: denied { confidentiality } for pid=4414 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:02:26.095000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe68879840 a2=94 a3=83 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.095000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.096000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.096000 audit[4414]: AVC avc: denied { confidentiality } for pid=4414 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:02:26.096000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe68879840 a2=94 a3=83 items=0 ppid=4317 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 01:02:26.122000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.122000 audit: BPF prog-id=166 op=LOAD May 10 01:02:26.122000 audit[4420]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd02fc0d0 a2=98 a3=1999999999999999 items=0 ppid=4317 pid=4420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.122000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 01:02:26.123000 audit: BPF prog-id=166 op=UNLOAD May 10 01:02:26.123000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit: BPF prog-id=167 op=LOAD May 10 01:02:26.123000 audit[4420]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd02fbfb0 a2=74 a3=ffff items=0 ppid=4317 pid=4420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.123000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 01:02:26.123000 audit: BPF prog-id=167 op=UNLOAD May 10 01:02:26.123000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { perfmon } for pid=4420 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit[4420]: AVC avc: denied { bpf } for pid=4420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.123000 audit: BPF prog-id=168 op=LOAD May 10 01:02:26.123000 audit[4420]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd02fbff0 a2=40 a3=7ffcd02fc1d0 items=0 ppid=4317 pid=4420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.123000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 01:02:26.124000 audit: BPF prog-id=168 op=UNLOAD May 10 01:02:26.174832 systemd-networkd[1061]: vxlan.calico: Link UP May 10 01:02:26.174836 systemd-networkd[1061]: vxlan.calico: Gained carrier May 10 01:02:26.193000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.193000 audit: BPF prog-id=169 op=LOAD May 10 01:02:26.193000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe114f6f90 a2=98 a3=ffffffff items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.193000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.193000 audit: BPF prog-id=169 op=UNLOAD May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit: BPF prog-id=170 op=LOAD May 10 01:02:26.194000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe114f6da0 a2=74 a3=540051 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.194000 audit: BPF prog-id=170 op=UNLOAD May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit: BPF prog-id=171 op=LOAD May 10 01:02:26.194000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe114f6dd0 a2=94 a3=2 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.194000 audit: BPF prog-id=171 op=UNLOAD May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe114f6ca0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe114f6cd0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe114f6be0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.194000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.194000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe114f6cf0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.194000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe114f6cd0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe114f6cc0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe114f6cf0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe114f6cd0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe114f6cf0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe114f6cc0 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe114f6d30 a2=28 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit: BPF prog-id=172 op=LOAD May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe114f6ba0 a2=40 a3=0 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit: BPF prog-id=172 op=UNLOAD May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe114f6b90 a2=50 a3=2800 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe114f6b90 a2=50 a3=2800 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit: BPF prog-id=173 op=LOAD May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe114f63b0 a2=94 a3=2 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.195000 audit: BPF prog-id=173 op=UNLOAD May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.195000 audit: BPF prog-id=174 op=LOAD May 10 01:02:26.195000 audit[4449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe114f64b0 a2=94 a3=30 items=0 ppid=4317 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.195000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit: BPF prog-id=175 op=LOAD May 10 01:02:26.205000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea91b34a0 a2=98 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.205000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.205000 audit: BPF prog-id=175 op=UNLOAD May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit: BPF prog-id=176 op=LOAD May 10 01:02:26.205000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea91b3280 a2=74 a3=540051 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.205000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.205000 audit: BPF prog-id=176 op=UNLOAD May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.205000 audit: BPF prog-id=177 op=LOAD May 10 01:02:26.205000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea91b32b0 a2=94 a3=2 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.205000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.205000 audit: BPF prog-id=177 op=UNLOAD May 10 01:02:26.283000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.283000 audit: BPF prog-id=178 op=LOAD May 10 01:02:26.283000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea91b3170 a2=40 a3=1 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.283000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.284000 audit: BPF prog-id=178 op=UNLOAD May 10 01:02:26.284000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.284000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffea91b3240 a2=50 a3=7ffea91b3320 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.284000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91b3180 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91b31b0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91b30c0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91b31d0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91b31b0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91b31a0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91b31d0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91b31b0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91b31d0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91b31a0 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91b3210 a2=28 a3=0 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea91b2fc0 a2=50 a3=1 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.293000 audit: BPF prog-id=179 op=LOAD May 10 01:02:26.293000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea91b2fc0 a2=94 a3=5 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.294000 audit: BPF prog-id=179 op=UNLOAD May 10 01:02:26.294000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea91b3070 a2=50 a3=1 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffea91b3190 a2=4 a3=38 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.294000 audit[4451]: AVC avc: denied { confidentiality } for pid=4451 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:02:26.294000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea91b31e0 a2=94 a3=6 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.295000 audit[4451]: AVC avc: denied { confidentiality } for pid=4451 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:02:26.295000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea91b2990 a2=94 a3=83 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.295000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { perfmon } for pid=4451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.296000 audit[4451]: AVC avc: denied { confidentiality } for pid=4451 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 01:02:26.296000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea91b2990 a2=94 a3=83 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.296000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.297000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.297000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea91b43d0 a2=10 a3=f1f00800 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.297000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.297000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.297000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea91b4270 a2=10 a3=3 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.297000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.297000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.297000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea91b4210 a2=10 a3=3 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.297000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.297000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:26.297000 audit[4451]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffea91b4210 a2=10 a3=7 items=0 ppid=4317 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.297000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 01:02:26.302000 audit: BPF prog-id=174 op=UNLOAD May 10 01:02:26.312528 systemd[1]: run-containerd-runc-k8s.io-a42c271356d2ca2b6abb7ad6e4664d1c1d39c4bddeac11b9a39ec6b8ccd88916-runc.18isAh.mount: Deactivated successfully. May 10 01:02:26.394000 audit[4506]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4506 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:26.394000 audit[4506]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc488f8410 a2=0 a3=7ffc488f83fc items=0 ppid=4317 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.394000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:26.404000 audit[4504]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=4504 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:26.404000 audit[4504]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc18f66240 a2=0 a3=7ffc18f6622c items=0 ppid=4317 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.404000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:26.406000 audit[4507]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:26.406000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc49acb150 a2=0 a3=7ffc49acb13c items=0 ppid=4317 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.406000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:26.407000 audit[4508]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4508 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:26.407000 audit[4508]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc6e557a10 a2=0 a3=7ffc6e5579fc items=0 ppid=4317 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:26.407000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:28.076080 env[1248]: time="2025-05-10T01:02:28.075989779Z" level=info msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\"" May 10 01:02:28.192494 kubelet[2100]: I0510 01:02:28.191061 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-sbf7m" podStartSLOduration=9.187910082 podStartE2EDuration="9.187910082s" podCreationTimestamp="2025-05-10 01:02:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:02:25.3136374 +0000 UTC m=+78.345607982" watchObservedRunningTime="2025-05-10 01:02:28.187910082 +0000 UTC m=+81.219880666" May 10 01:02:28.201412 systemd-networkd[1061]: vxlan.calico: Gained IPv6LL May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.188 [INFO][4541] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.189 [INFO][4541] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" iface="eth0" netns="/var/run/netns/cni-2a02fd18-a7fa-180c-047e-3e1b5aa769cb" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.189 [INFO][4541] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" iface="eth0" netns="/var/run/netns/cni-2a02fd18-a7fa-180c-047e-3e1b5aa769cb" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.189 [INFO][4541] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" iface="eth0" netns="/var/run/netns/cni-2a02fd18-a7fa-180c-047e-3e1b5aa769cb" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.189 [INFO][4541] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.189 [INFO][4541] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.245 [INFO][4549] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" HandleID="k8s-pod-network.80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" Workload="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.246 [INFO][4549] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.246 [INFO][4549] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.260 [WARNING][4549] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" HandleID="k8s-pod-network.80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" Workload="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.260 [INFO][4549] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" HandleID="k8s-pod-network.80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" Workload="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.261 [INFO][4549] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:28.264862 env[1248]: 2025-05-10 01:02:28.263 [INFO][4541] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e" May 10 01:02:28.267767 systemd[1]: run-netns-cni\x2d2a02fd18\x2da7fa\x2d180c\x2d047e\x2d3e1b5aa769cb.mount: Deactivated successfully. May 10 01:02:28.268352 env[1248]: time="2025-05-10T01:02:28.268323265Z" level=info msg="TearDown network for sandbox \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\" successfully" May 10 01:02:28.268437 env[1248]: time="2025-05-10T01:02:28.268412928Z" level=info msg="StopPodSandbox for \"80b31676b787e0d8f2808729884eb6ba517432fac75a97219cb68c5653af630e\" returns successfully" May 10 01:02:28.269113 env[1248]: time="2025-05-10T01:02:28.269092106Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-677495b4c7-vktzl,Uid:4d0efb5e-e655-4540-9c5c-9c1ebcc357c2,Namespace:calico-system,Attempt:1,}" May 10 01:02:28.361212 systemd-networkd[1061]: cali1ee5cf8b830: Link UP May 10 01:02:28.363649 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 01:02:28.363688 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1ee5cf8b830: link becomes ready May 10 01:02:28.363639 systemd-networkd[1061]: cali1ee5cf8b830: Gained carrier May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.310 [INFO][4555] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0 calico-kube-controllers-677495b4c7- calico-system 4d0efb5e-e655-4540-9c5c-9c1ebcc357c2 1011 0 2025-05-10 01:01:18 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:677495b4c7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-677495b4c7-vktzl eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali1ee5cf8b830 [] []}} ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Namespace="calico-system" Pod="calico-kube-controllers-677495b4c7-vktzl" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.311 [INFO][4555] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Namespace="calico-system" Pod="calico-kube-controllers-677495b4c7-vktzl" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.333 [INFO][4568] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" HandleID="k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Workload="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.340 [INFO][4568] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" HandleID="k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Workload="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003130b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-677495b4c7-vktzl", "timestamp":"2025-05-10 01:02:28.333794981 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.340 [INFO][4568] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.340 [INFO][4568] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.340 [INFO][4568] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.341 [INFO][4568] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.345 [INFO][4568] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.347 [INFO][4568] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.348 [INFO][4568] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.349 [INFO][4568] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.349 [INFO][4568] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.349 [INFO][4568] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8 May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.351 [INFO][4568] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.354 [INFO][4568] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.354 [INFO][4568] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" host="localhost" May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.354 [INFO][4568] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:28.373439 env[1248]: 2025-05-10 01:02:28.354 [INFO][4568] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" HandleID="k8s-pod-network.abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Workload="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.374502 env[1248]: 2025-05-10 01:02:28.356 [INFO][4555] cni-plugin/k8s.go 386: Populated endpoint ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Namespace="calico-system" Pod="calico-kube-controllers-677495b4c7-vktzl" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0", GenerateName:"calico-kube-controllers-677495b4c7-", Namespace:"calico-system", SelfLink:"", UID:"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"677495b4c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-677495b4c7-vktzl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1ee5cf8b830", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:28.374502 env[1248]: 2025-05-10 01:02:28.356 [INFO][4555] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Namespace="calico-system" Pod="calico-kube-controllers-677495b4c7-vktzl" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.374502 env[1248]: 2025-05-10 01:02:28.356 [INFO][4555] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1ee5cf8b830 ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Namespace="calico-system" Pod="calico-kube-controllers-677495b4c7-vktzl" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.374502 env[1248]: 2025-05-10 01:02:28.364 [INFO][4555] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Namespace="calico-system" Pod="calico-kube-controllers-677495b4c7-vktzl" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.374502 env[1248]: 2025-05-10 01:02:28.364 [INFO][4555] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Namespace="calico-system" Pod="calico-kube-controllers-677495b4c7-vktzl" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0", GenerateName:"calico-kube-controllers-677495b4c7-", Namespace:"calico-system", SelfLink:"", UID:"4d0efb5e-e655-4540-9c5c-9c1ebcc357c2", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"677495b4c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8", Pod:"calico-kube-controllers-677495b4c7-vktzl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1ee5cf8b830", MAC:"92:4e:43:69:3c:91", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:28.374502 env[1248]: 2025-05-10 01:02:28.371 [INFO][4555] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8" Namespace="calico-system" Pod="calico-kube-controllers-677495b4c7-vktzl" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--677495b4c7--vktzl-eth0" May 10 01:02:28.386002 env[1248]: time="2025-05-10T01:02:28.385963264Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:02:28.386115 env[1248]: time="2025-05-10T01:02:28.385988109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:02:28.386115 env[1248]: time="2025-05-10T01:02:28.386002817Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:02:28.386115 env[1248]: time="2025-05-10T01:02:28.386092894Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8 pid=4595 runtime=io.containerd.runc.v2 May 10 01:02:28.388000 audit[4601]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4601 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:28.388000 audit[4601]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe6e164270 a2=0 a3=7ffe6e16425c items=0 ppid=4317 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:28.388000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:28.396690 systemd[1]: Started cri-containerd-abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8.scope. May 10 01:02:28.401814 systemd[1]: run-containerd-runc-k8s.io-abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8-runc.KXUG88.mount: Deactivated successfully. May 10 01:02:28.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit: BPF prog-id=180 op=LOAD May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:28.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162623138646631646336336437613866316331313864346666623032 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:28.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162623138646631646336336437613866316331313864346666623032 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit: BPF prog-id=181 op=LOAD May 10 01:02:28.409000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002f5d90 items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:28.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162623138646631646336336437613866316331313864346666623032 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.409000 audit: BPF prog-id=182 op=LOAD May 10 01:02:28.409000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002f5dd8 items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:28.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162623138646631646336336437613866316331313864346666623032 May 10 01:02:28.411000 audit: BPF prog-id=182 op=UNLOAD May 10 01:02:28.411000 audit: BPF prog-id=181 op=UNLOAD May 10 01:02:28.411000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:28.411000 audit: BPF prog-id=183 op=LOAD May 10 01:02:28.411000 audit[4605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00036c1e8 items=0 ppid=4595 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:28.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162623138646631646336336437613866316331313864346666623032 May 10 01:02:28.419697 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 01:02:28.439571 env[1248]: time="2025-05-10T01:02:28.439540150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-677495b4c7-vktzl,Uid:4d0efb5e-e655-4540-9c5c-9c1ebcc357c2,Namespace:calico-system,Attempt:1,} returns sandbox id \"abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8\"" May 10 01:02:28.446949 env[1248]: time="2025-05-10T01:02:28.446922001Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 01:02:29.949720 systemd[1]: Started sshd@13-139.178.70.100:22-139.178.89.65:39914.service. May 10 01:02:29.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.100:22-139.178.89.65:39914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:29.950874 kernel: kauditd_printk_skb: 619 callbacks suppressed May 10 01:02:29.950943 kernel: audit: type=1130 audit(1746838949.948:1241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.100:22-139.178.89.65:39914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:30.019000 audit[4631]: USER_ACCT pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.021112 sshd[4631]: Accepted publickey for core from 139.178.89.65 port 39914 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:30.024323 kernel: audit: type=1101 audit(1746838950.019:1242): pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.023000 audit[4631]: CRED_ACQ pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.028215 sshd[4631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:30.028373 kernel: audit: type=1103 audit(1746838950.023:1243): pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.023000 audit[4631]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7adf070 a2=3 a3=0 items=0 ppid=1 pid=4631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:30.033616 kernel: audit: type=1006 audit(1746838950.023:1244): pid=4631 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 01:02:30.033650 kernel: audit: type=1300 audit(1746838950.023:1244): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7adf070 a2=3 a3=0 items=0 ppid=1 pid=4631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:30.023000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:30.034795 kernel: audit: type=1327 audit(1746838950.023:1244): proctitle=737368643A20636F7265205B707269765D May 10 01:02:30.037973 systemd-logind[1241]: New session 16 of user core. May 10 01:02:30.038569 systemd[1]: Started session-16.scope. May 10 01:02:30.042000 audit[4631]: USER_START pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.048322 kernel: audit: type=1105 audit(1746838950.042:1245): pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.046000 audit[4633]: CRED_ACQ pid=4633 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.052308 kernel: audit: type=1103 audit(1746838950.046:1246): pid=4633 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.057389 systemd-networkd[1061]: cali1ee5cf8b830: Gained IPv6LL May 10 01:02:30.484115 sshd[4631]: pam_unix(sshd:session): session closed for user core May 10 01:02:30.483000 audit[4631]: USER_END pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.488000 audit[4631]: CRED_DISP pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.495273 kernel: audit: type=1106 audit(1746838950.483:1247): pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.495330 kernel: audit: type=1104 audit(1746838950.488:1248): pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:30.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.100:22-139.178.89.65:39914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:30.490982 systemd[1]: sshd@13-139.178.70.100:22-139.178.89.65:39914.service: Deactivated successfully. May 10 01:02:30.491550 systemd[1]: session-16.scope: Deactivated successfully. May 10 01:02:30.494244 systemd-logind[1241]: Session 16 logged out. Waiting for processes to exit. May 10 01:02:30.494839 systemd-logind[1241]: Removed session 16. May 10 01:02:31.081944 env[1248]: time="2025-05-10T01:02:31.081918249Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:31.083487 env[1248]: time="2025-05-10T01:02:31.083468890Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:31.084792 env[1248]: time="2025-05-10T01:02:31.084774104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:31.085877 env[1248]: time="2025-05-10T01:02:31.085860147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:31.086544 env[1248]: time="2025-05-10T01:02:31.086454783Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 01:02:31.239987 env[1248]: time="2025-05-10T01:02:31.239653519Z" level=info msg="CreateContainer within sandbox \"abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 01:02:31.246677 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount643174184.mount: Deactivated successfully. May 10 01:02:31.248759 env[1248]: time="2025-05-10T01:02:31.248738470Z" level=info msg="CreateContainer within sandbox \"abb18df1dc63d7a8f1c118d4ffb02a26fe871c3f54432d8c92a7b4fa81e172a8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"161135e38afd551f0d2d10a74300ddb8ed7a6f98e84f929bf158cdb45164e0d1\"" May 10 01:02:31.249326 env[1248]: time="2025-05-10T01:02:31.249309495Z" level=info msg="StartContainer for \"161135e38afd551f0d2d10a74300ddb8ed7a6f98e84f929bf158cdb45164e0d1\"" May 10 01:02:31.267630 systemd[1]: Started cri-containerd-161135e38afd551f0d2d10a74300ddb8ed7a6f98e84f929bf158cdb45164e0d1.scope. May 10 01:02:31.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit: BPF prog-id=184 op=LOAD May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4595 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:31.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313133356533386166643535316630643264313061373433303064 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4595 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:31.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313133356533386166643535316630643264313061373433303064 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit: BPF prog-id=185 op=LOAD May 10 01:02:31.292000 audit[4650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000222d00 items=0 ppid=4595 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:31.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313133356533386166643535316630643264313061373433303064 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit: BPF prog-id=186 op=LOAD May 10 01:02:31.292000 audit[4650]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000222d48 items=0 ppid=4595 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:31.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313133356533386166643535316630643264313061373433303064 May 10 01:02:31.292000 audit: BPF prog-id=186 op=UNLOAD May 10 01:02:31.292000 audit: BPF prog-id=185 op=UNLOAD May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { perfmon } for pid=4650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit[4650]: AVC avc: denied { bpf } for pid=4650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:31.292000 audit: BPF prog-id=187 op=LOAD May 10 01:02:31.292000 audit[4650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000223158 items=0 ppid=4595 pid=4650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:31.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313133356533386166643535316630643264313061373433303064 May 10 01:02:31.319471 env[1248]: time="2025-05-10T01:02:31.315886068Z" level=info msg="StartContainer for \"161135e38afd551f0d2d10a74300ddb8ed7a6f98e84f929bf158cdb45164e0d1\" returns successfully" May 10 01:02:31.380201 kubelet[2100]: I0510 01:02:31.380119 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-677495b4c7-vktzl" podStartSLOduration=70.727261206 podStartE2EDuration="1m13.377934586s" podCreationTimestamp="2025-05-10 01:01:18 +0000 UTC" firstStartedPulling="2025-05-10 01:02:28.441987835 +0000 UTC m=+81.473958418" lastFinishedPulling="2025-05-10 01:02:31.092661211 +0000 UTC m=+84.124631798" observedRunningTime="2025-05-10 01:02:31.373219232 +0000 UTC m=+84.405189824" watchObservedRunningTime="2025-05-10 01:02:31.377934586 +0000 UTC m=+84.409905171" May 10 01:02:34.076264 env[1248]: time="2025-05-10T01:02:34.076230694Z" level=info msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\"" May 10 01:02:34.076552 env[1248]: time="2025-05-10T01:02:34.076522192Z" level=info msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\"" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.171 [INFO][4736] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.173 [INFO][4736] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" iface="eth0" netns="/var/run/netns/cni-923cf4d8-7f2b-23f8-48c9-e6ba885d3c68" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.173 [INFO][4736] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" iface="eth0" netns="/var/run/netns/cni-923cf4d8-7f2b-23f8-48c9-e6ba885d3c68" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.173 [INFO][4736] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" iface="eth0" netns="/var/run/netns/cni-923cf4d8-7f2b-23f8-48c9-e6ba885d3c68" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.173 [INFO][4736] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.173 [INFO][4736] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.200 [INFO][4751] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" HandleID="k8s-pod-network.4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" Workload="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.201 [INFO][4751] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.201 [INFO][4751] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.204 [WARNING][4751] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" HandleID="k8s-pod-network.4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" Workload="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.204 [INFO][4751] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" HandleID="k8s-pod-network.4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" Workload="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.205 [INFO][4751] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:34.208518 env[1248]: 2025-05-10 01:02:34.207 [INFO][4736] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf" May 10 01:02:34.210044 systemd[1]: run-netns-cni\x2d923cf4d8\x2d7f2b\x2d23f8\x2d48c9\x2de6ba885d3c68.mount: Deactivated successfully. May 10 01:02:34.210947 env[1248]: time="2025-05-10T01:02:34.210489243Z" level=info msg="TearDown network for sandbox \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\" successfully" May 10 01:02:34.210947 env[1248]: time="2025-05-10T01:02:34.210509988Z" level=info msg="StopPodSandbox for \"4680eb599f28ed27520182a8d6aa188c90db6a3d971fd19a158500339c1e08cf\" returns successfully" May 10 01:02:34.214654 env[1248]: time="2025-05-10T01:02:34.214627960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qj7qn,Uid:6c7072c9-84f3-4473-ab9f-6d77c8d21e93,Namespace:kube-system,Attempt:1,}" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.174 [INFO][4737] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.174 [INFO][4737] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" iface="eth0" netns="/var/run/netns/cni-2553c7ac-1cbc-0ba1-3975-5a2e412d31b3" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.174 [INFO][4737] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" iface="eth0" netns="/var/run/netns/cni-2553c7ac-1cbc-0ba1-3975-5a2e412d31b3" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.174 [INFO][4737] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" iface="eth0" netns="/var/run/netns/cni-2553c7ac-1cbc-0ba1-3975-5a2e412d31b3" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.174 [INFO][4737] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.174 [INFO][4737] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.200 [INFO][4752] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" HandleID="k8s-pod-network.847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" Workload="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.201 [INFO][4752] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.205 [INFO][4752] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.212 [WARNING][4752] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" HandleID="k8s-pod-network.847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" Workload="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.212 [INFO][4752] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" HandleID="k8s-pod-network.847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" Workload="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.213 [INFO][4752] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:34.216523 env[1248]: 2025-05-10 01:02:34.215 [INFO][4737] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442" May 10 01:02:34.217956 systemd[1]: run-netns-cni\x2d2553c7ac\x2d1cbc\x2d0ba1\x2d3975\x2d5a2e412d31b3.mount: Deactivated successfully. May 10 01:02:34.218619 env[1248]: time="2025-05-10T01:02:34.218492449Z" level=info msg="TearDown network for sandbox \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\" successfully" May 10 01:02:34.218619 env[1248]: time="2025-05-10T01:02:34.218524473Z" level=info msg="StopPodSandbox for \"847dc66103cfda51ba1cc9a2c7dc32819b30ac2e244d76f17c31034583ff5442\" returns successfully" May 10 01:02:34.218870 env[1248]: time="2025-05-10T01:02:34.218852871Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9qdlp,Uid:496dec10-f9bd-4cc8-9fbd-5feb996d9abc,Namespace:calico-system,Attempt:1,}" May 10 01:02:34.333398 systemd-networkd[1061]: calib5053fe1fec: Link UP May 10 01:02:34.336254 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 01:02:34.336305 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib5053fe1fec: link becomes ready May 10 01:02:34.336214 systemd-networkd[1061]: calib5053fe1fec: Gained carrier May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.258 [INFO][4763] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--9qdlp-eth0 csi-node-driver- calico-system 496dec10-f9bd-4cc8-9fbd-5feb996d9abc 1052 0 2025-05-10 01:01:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-9qdlp eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib5053fe1fec [] []}} ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Namespace="calico-system" Pod="csi-node-driver-9qdlp" WorkloadEndpoint="localhost-k8s-csi--node--driver--9qdlp-" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.258 [INFO][4763] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Namespace="calico-system" Pod="csi-node-driver-9qdlp" WorkloadEndpoint="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.279 [INFO][4793] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" HandleID="k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Workload="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.294 [INFO][4793] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" HandleID="k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Workload="localhost-k8s-csi--node--driver--9qdlp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003130b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-9qdlp", "timestamp":"2025-05-10 01:02:34.27936439 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.296 [INFO][4793] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.296 [INFO][4793] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.297 [INFO][4793] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.297 [INFO][4793] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.317 [INFO][4793] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.320 [INFO][4793] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.321 [INFO][4793] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.322 [INFO][4793] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.322 [INFO][4793] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.323 [INFO][4793] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9 May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.325 [INFO][4793] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.328 [INFO][4793] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.328 [INFO][4793] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" host="localhost" May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.328 [INFO][4793] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:34.349251 env[1248]: 2025-05-10 01:02:34.328 [INFO][4793] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" HandleID="k8s-pod-network.938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Workload="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.349745 env[1248]: 2025-05-10 01:02:34.330 [INFO][4763] cni-plugin/k8s.go 386: Populated endpoint ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Namespace="calico-system" Pod="csi-node-driver-9qdlp" WorkloadEndpoint="localhost-k8s-csi--node--driver--9qdlp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9qdlp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"496dec10-f9bd-4cc8-9fbd-5feb996d9abc", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-9qdlp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib5053fe1fec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:34.349745 env[1248]: 2025-05-10 01:02:34.330 [INFO][4763] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Namespace="calico-system" Pod="csi-node-driver-9qdlp" WorkloadEndpoint="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.349745 env[1248]: 2025-05-10 01:02:34.330 [INFO][4763] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib5053fe1fec ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Namespace="calico-system" Pod="csi-node-driver-9qdlp" WorkloadEndpoint="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.349745 env[1248]: 2025-05-10 01:02:34.336 [INFO][4763] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Namespace="calico-system" Pod="csi-node-driver-9qdlp" WorkloadEndpoint="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.349745 env[1248]: 2025-05-10 01:02:34.336 [INFO][4763] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Namespace="calico-system" Pod="csi-node-driver-9qdlp" WorkloadEndpoint="localhost-k8s-csi--node--driver--9qdlp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9qdlp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"496dec10-f9bd-4cc8-9fbd-5feb996d9abc", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9", Pod:"csi-node-driver-9qdlp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib5053fe1fec", MAC:"a6:ec:be:41:22:f7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:34.349745 env[1248]: 2025-05-10 01:02:34.348 [INFO][4763] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9" Namespace="calico-system" Pod="csi-node-driver-9qdlp" WorkloadEndpoint="localhost-k8s-csi--node--driver--9qdlp-eth0" May 10 01:02:34.354000 audit[4821]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:34.354000 audit[4821]: SYSCALL arch=c000003e syscall=46 success=yes exit=18640 a0=3 a1=7ffca674aef0 a2=0 a3=7ffca674aedc items=0 ppid=4317 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.356329 env[1248]: time="2025-05-10T01:02:34.356087941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:02:34.356329 env[1248]: time="2025-05-10T01:02:34.356116270Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:02:34.356329 env[1248]: time="2025-05-10T01:02:34.356123141Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:02:34.356329 env[1248]: time="2025-05-10T01:02:34.356212249Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9 pid=4825 runtime=io.containerd.runc.v2 May 10 01:02:34.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:34.364351 systemd[1]: Started cri-containerd-938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9.scope. May 10 01:02:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.371000 audit: BPF prog-id=188 op=LOAD May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4825 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386335333030353431633265646234366266623061353161636136 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4825 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386335333030353431633265646234366266623061353161636136 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit: BPF prog-id=189 op=LOAD May 10 01:02:34.372000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003540b0 items=0 ppid=4825 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386335333030353431633265646234366266623061353161636136 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit: BPF prog-id=190 op=LOAD May 10 01:02:34.372000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003540f8 items=0 ppid=4825 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386335333030353431633265646234366266623061353161636136 May 10 01:02:34.372000 audit: BPF prog-id=190 op=UNLOAD May 10 01:02:34.372000 audit: BPF prog-id=189 op=UNLOAD May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.372000 audit: BPF prog-id=191 op=LOAD May 10 01:02:34.372000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000354508 items=0 ppid=4825 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386335333030353431633265646234366266623061353161636136 May 10 01:02:34.374114 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 01:02:34.385541 env[1248]: time="2025-05-10T01:02:34.385516112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9qdlp,Uid:496dec10-f9bd-4cc8-9fbd-5feb996d9abc,Namespace:calico-system,Attempt:1,} returns sandbox id \"938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9\"" May 10 01:02:34.396231 env[1248]: time="2025-05-10T01:02:34.396209992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 01:02:34.435015 systemd-networkd[1061]: califef20c05a60: Link UP May 10 01:02:34.436529 systemd-networkd[1061]: califef20c05a60: Gained carrier May 10 01:02:34.437383 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califef20c05a60: link becomes ready May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.259 [INFO][4765] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0 coredns-6f6b679f8f- kube-system 6c7072c9-84f3-4473-ab9f-6d77c8d21e93 1051 0 2025-05-10 01:01:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-qj7qn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califef20c05a60 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj7qn" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj7qn-" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.259 [INFO][4765] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj7qn" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.277 [INFO][4787] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" HandleID="k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Workload="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.301 [INFO][4787] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" HandleID="k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Workload="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314af0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-qj7qn", "timestamp":"2025-05-10 01:02:34.277325996 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.301 [INFO][4787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.328 [INFO][4787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.328 [INFO][4787] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.399 [INFO][4787] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.401 [INFO][4787] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.420 [INFO][4787] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.421 [INFO][4787] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.423 [INFO][4787] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.423 [INFO][4787] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.424 [INFO][4787] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287 May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.427 [INFO][4787] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.431 [INFO][4787] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.431 [INFO][4787] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" host="localhost" May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.431 [INFO][4787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:34.449044 env[1248]: 2025-05-10 01:02:34.431 [INFO][4787] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" HandleID="k8s-pod-network.3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Workload="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.451244 env[1248]: 2025-05-10 01:02:34.432 [INFO][4765] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj7qn" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6c7072c9-84f3-4473-ab9f-6d77c8d21e93", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-qj7qn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califef20c05a60", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:34.451244 env[1248]: 2025-05-10 01:02:34.433 [INFO][4765] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj7qn" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.451244 env[1248]: 2025-05-10 01:02:34.433 [INFO][4765] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califef20c05a60 ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj7qn" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.451244 env[1248]: 2025-05-10 01:02:34.435 [INFO][4765] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj7qn" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.451244 env[1248]: 2025-05-10 01:02:34.436 [INFO][4765] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj7qn" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6c7072c9-84f3-4473-ab9f-6d77c8d21e93", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287", Pod:"coredns-6f6b679f8f-qj7qn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califef20c05a60", MAC:"7e:d7:23:cc:a8:f7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:34.451244 env[1248]: 2025-05-10 01:02:34.446 [INFO][4765] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287" Namespace="kube-system" Pod="coredns-6f6b679f8f-qj7qn" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--qj7qn-eth0" May 10 01:02:34.457000 audit[4875]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=4875 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:34.457000 audit[4875]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffeb2112540 a2=0 a3=7ffeb211252c items=0 ppid=4317 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.457000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:34.462116 env[1248]: time="2025-05-10T01:02:34.461987815Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:02:34.462116 env[1248]: time="2025-05-10T01:02:34.462037197Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:02:34.462116 env[1248]: time="2025-05-10T01:02:34.462052989Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:02:34.462612 env[1248]: time="2025-05-10T01:02:34.462122139Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287 pid=4882 runtime=io.containerd.runc.v2 May 10 01:02:34.470800 systemd[1]: Started cri-containerd-3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287.scope. May 10 01:02:34.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit: BPF prog-id=192 op=LOAD May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4882 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366533333637313836636663653732656631613230343436306135 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4882 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366533333637313836636663653732656631613230343436306135 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit: BPF prog-id=193 op=LOAD May 10 01:02:34.478000 audit[4889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002cbdc0 items=0 ppid=4882 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366533333637313836636663653732656631613230343436306135 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit: BPF prog-id=194 op=LOAD May 10 01:02:34.478000 audit[4889]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002cbe08 items=0 ppid=4882 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366533333637313836636663653732656631613230343436306135 May 10 01:02:34.478000 audit: BPF prog-id=194 op=UNLOAD May 10 01:02:34.478000 audit: BPF prog-id=193 op=UNLOAD May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { perfmon } for pid=4889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit[4889]: AVC avc: denied { bpf } for pid=4889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.478000 audit: BPF prog-id=195 op=LOAD May 10 01:02:34.478000 audit[4889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00033e218 items=0 ppid=4882 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366366533333637313836636663653732656631613230343436306135 May 10 01:02:34.480633 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 01:02:34.499295 env[1248]: time="2025-05-10T01:02:34.499259604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qj7qn,Uid:6c7072c9-84f3-4473-ab9f-6d77c8d21e93,Namespace:kube-system,Attempt:1,} returns sandbox id \"3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287\"" May 10 01:02:34.504095 env[1248]: time="2025-05-10T01:02:34.504072957Z" level=info msg="CreateContainer within sandbox \"3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 01:02:34.520997 env[1248]: time="2025-05-10T01:02:34.520966658Z" level=info msg="CreateContainer within sandbox \"3f6e3367186cfce72ef1a204460a5f62af857dce7ad9abda0ca8d574a0f5d287\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4ff2941c6afe50c9633a845c886e5bfaf6864ce2bb62b03db48c4ae3abd4b514\"" May 10 01:02:34.521980 env[1248]: time="2025-05-10T01:02:34.521348072Z" level=info msg="StartContainer for \"4ff2941c6afe50c9633a845c886e5bfaf6864ce2bb62b03db48c4ae3abd4b514\"" May 10 01:02:34.530226 systemd[1]: Started cri-containerd-4ff2941c6afe50c9633a845c886e5bfaf6864ce2bb62b03db48c4ae3abd4b514.scope. May 10 01:02:34.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit: BPF prog-id=196 op=LOAD May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4882 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663239343163366166653530633936333361383435633838366535 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4882 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663239343163366166653530633936333361383435633838366535 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit: BPF prog-id=197 op=LOAD May 10 01:02:34.538000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000efda0 items=0 ppid=4882 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663239343163366166653530633936333361383435633838366535 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit: BPF prog-id=198 op=LOAD May 10 01:02:34.538000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000efde8 items=0 ppid=4882 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663239343163366166653530633936333361383435633838366535 May 10 01:02:34.538000 audit: BPF prog-id=198 op=UNLOAD May 10 01:02:34.538000 audit: BPF prog-id=197 op=UNLOAD May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:34.538000 audit: BPF prog-id=199 op=LOAD May 10 01:02:34.538000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033c1f8 items=0 ppid=4882 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:34.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466663239343163366166653530633936333361383435633838366535 May 10 01:02:34.549791 env[1248]: time="2025-05-10T01:02:34.549762193Z" level=info msg="StartContainer for \"4ff2941c6afe50c9633a845c886e5bfaf6864ce2bb62b03db48c4ae3abd4b514\" returns successfully" May 10 01:02:35.377098 kubelet[2100]: I0510 01:02:35.377067 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-qj7qn" podStartSLOduration=83.377055208 podStartE2EDuration="1m23.377055208s" podCreationTimestamp="2025-05-10 01:01:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:02:35.376721594 +0000 UTC m=+88.408692184" watchObservedRunningTime="2025-05-10 01:02:35.377055208 +0000 UTC m=+88.409025792" May 10 01:02:35.478000 audit[4954]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:35.480867 kernel: kauditd_printk_skb: 235 callbacks suppressed May 10 01:02:35.480909 kernel: audit: type=1325 audit(1746838955.478:1324): table=filter:104 family=2 entries=13 op=nft_register_rule pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:35.478000 audit[4954]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffddb1af8f0 a2=0 a3=7ffddb1af8dc items=0 ppid=2232 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.486594 kernel: audit: type=1300 audit(1746838955.478:1324): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffddb1af8f0 a2=0 a3=7ffddb1af8dc items=0 ppid=2232 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:35.488799 kernel: audit: type=1327 audit(1746838955.478:1324): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:35.490614 systemd[1]: Started sshd@14-139.178.70.100:22-139.178.89.65:39916.service. May 10 01:02:35.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-139.178.89.65:39916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:35.495540 kernel: audit: type=1130 audit(1746838955.489:1325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-139.178.89.65:39916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:35.494000 audit[4954]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:35.494000 audit[4954]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffddb1af8f0 a2=0 a3=7ffddb1af8dc items=0 ppid=2232 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.501514 kernel: audit: type=1325 audit(1746838955.494:1326): table=nat:105 family=2 entries=35 op=nft_register_chain pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:35.501553 kernel: audit: type=1300 audit(1746838955.494:1326): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffddb1af8f0 a2=0 a3=7ffddb1af8dc items=0 ppid=2232 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:35.503545 kernel: audit: type=1327 audit(1746838955.494:1326): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:35.519000 audit[4959]: NETFILTER_CFG table=filter:106 family=2 entries=10 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:35.519000 audit[4959]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd743a2870 a2=0 a3=7ffd743a285c items=0 ppid=2232 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.527524 kernel: audit: type=1325 audit(1746838955.519:1327): table=filter:106 family=2 entries=10 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:35.528002 kernel: audit: type=1300 audit(1746838955.519:1327): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd743a2870 a2=0 a3=7ffd743a285c items=0 ppid=2232 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.519000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:35.529840 kernel: audit: type=1327 audit(1746838955.519:1327): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:35.523000 audit[4959]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=4959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:35.523000 audit[4959]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd743a2870 a2=0 a3=7ffd743a285c items=0 ppid=2232 pid=4959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:35.599000 audit[4956]: USER_ACCT pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:35.601445 sshd[4956]: Accepted publickey for core from 139.178.89.65 port 39916 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:35.600000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:35.600000 audit[4956]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddd920280 a2=3 a3=0 items=0 ppid=1 pid=4956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.600000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:35.602268 sshd[4956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:35.606513 systemd[1]: Started session-17.scope. May 10 01:02:35.606907 systemd-logind[1241]: New session 17 of user core. May 10 01:02:35.611000 audit[4956]: USER_START pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:35.612000 audit[4961]: CRED_ACQ pid=4961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:35.689466 systemd-networkd[1061]: calib5053fe1fec: Gained IPv6LL May 10 01:02:35.730056 env[1248]: time="2025-05-10T01:02:35.730030178Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:35.731082 env[1248]: time="2025-05-10T01:02:35.731065505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:35.731403 env[1248]: time="2025-05-10T01:02:35.731391009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:35.732065 env[1248]: time="2025-05-10T01:02:35.732050592Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:35.732437 env[1248]: time="2025-05-10T01:02:35.732422147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 01:02:35.773201 env[1248]: time="2025-05-10T01:02:35.773181407Z" level=info msg="CreateContainer within sandbox \"938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 01:02:35.781300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4060222050.mount: Deactivated successfully. May 10 01:02:35.785217 env[1248]: time="2025-05-10T01:02:35.785197930Z" level=info msg="CreateContainer within sandbox \"938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"82aff4692e1d525d91ff34fa036af6116cce2d733df7cc4bd083452326681841\"" May 10 01:02:35.785578 env[1248]: time="2025-05-10T01:02:35.785566073Z" level=info msg="StartContainer for \"82aff4692e1d525d91ff34fa036af6116cce2d733df7cc4bd083452326681841\"" May 10 01:02:35.815106 systemd[1]: Started cri-containerd-82aff4692e1d525d91ff34fa036af6116cce2d733df7cc4bd083452326681841.scope. May 10 01:02:35.833000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7fc60b0ac0 items=0 ppid=4825 pid=4976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832616666343639326531643532356439316666333466613033366166 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.833000 audit: BPF prog-id=200 op=LOAD May 10 01:02:35.833000 audit[4976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00039aeb8 items=0 ppid=4825 pid=4976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832616666343639326531643532356439316666333466613033366166 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit: BPF prog-id=201 op=LOAD May 10 01:02:35.834000 audit[4976]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00039af08 items=0 ppid=4825 pid=4976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832616666343639326531643532356439316666333466613033366166 May 10 01:02:35.834000 audit: BPF prog-id=201 op=UNLOAD May 10 01:02:35.834000 audit: BPF prog-id=200 op=UNLOAD May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { perfmon } for pid=4976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit[4976]: AVC avc: denied { bpf } for pid=4976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:35.834000 audit: BPF prog-id=202 op=LOAD May 10 01:02:35.834000 audit[4976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00039af98 items=0 ppid=4825 pid=4976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:35.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832616666343639326531643532356439316666333466613033366166 May 10 01:02:35.853550 env[1248]: time="2025-05-10T01:02:35.853527390Z" level=info msg="StartContainer for \"82aff4692e1d525d91ff34fa036af6116cce2d733df7cc4bd083452326681841\" returns successfully" May 10 01:02:35.870724 env[1248]: time="2025-05-10T01:02:35.870701235Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 01:02:36.064507 sshd[4956]: pam_unix(sshd:session): session closed for user core May 10 01:02:36.064000 audit[4956]: USER_END pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:36.064000 audit[4956]: CRED_DISP pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:36.066752 systemd[1]: sshd@14-139.178.70.100:22-139.178.89.65:39916.service: Deactivated successfully. May 10 01:02:36.067200 systemd[1]: session-17.scope: Deactivated successfully. May 10 01:02:36.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-139.178.89.65:39916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:36.067835 systemd-logind[1241]: Session 17 logged out. Waiting for processes to exit. May 10 01:02:36.068361 systemd-logind[1241]: Removed session 17. May 10 01:02:36.090665 env[1248]: time="2025-05-10T01:02:36.090423327Z" level=info msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\"" May 10 01:02:36.091662 env[1248]: time="2025-05-10T01:02:36.090487172Z" level=info msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\"" May 10 01:02:36.139036 systemd-networkd[1061]: califef20c05a60: Gained IPv6LL May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.125 [INFO][5031] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.125 [INFO][5031] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" iface="eth0" netns="/var/run/netns/cni-3b139af8-d195-6420-a914-01c6a4f26822" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.125 [INFO][5031] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" iface="eth0" netns="/var/run/netns/cni-3b139af8-d195-6420-a914-01c6a4f26822" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.126 [INFO][5031] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" iface="eth0" netns="/var/run/netns/cni-3b139af8-d195-6420-a914-01c6a4f26822" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.126 [INFO][5031] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.126 [INFO][5031] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.153 [INFO][5044] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" HandleID="k8s-pod-network.b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" Workload="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.153 [INFO][5044] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.153 [INFO][5044] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.158 [WARNING][5044] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" HandleID="k8s-pod-network.b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" Workload="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.158 [INFO][5044] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" HandleID="k8s-pod-network.b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" Workload="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.159 [INFO][5044] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:36.162315 env[1248]: 2025-05-10 01:02:36.160 [INFO][5031] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6" May 10 01:02:36.163019 env[1248]: time="2025-05-10T01:02:36.162995698Z" level=info msg="TearDown network for sandbox \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\" successfully" May 10 01:02:36.163087 env[1248]: time="2025-05-10T01:02:36.163076303Z" level=info msg="StopPodSandbox for \"b32498c5ddbaaec21f85fbc791376ff54071f428f1fdd0f2e1e277b3b39520d6\" returns successfully" May 10 01:02:36.172600 env[1248]: time="2025-05-10T01:02:36.172566038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5c86885d-wtfct,Uid:41128e7d-a5aa-4fe4-bf46-b5240a85e276,Namespace:calico-apiserver,Attempt:1,}" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.130 [INFO][5032] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.130 [INFO][5032] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" iface="eth0" netns="/var/run/netns/cni-ff84841d-0d3d-46a6-ef9a-5d2af0f7dbef" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.130 [INFO][5032] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" iface="eth0" netns="/var/run/netns/cni-ff84841d-0d3d-46a6-ef9a-5d2af0f7dbef" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.130 [INFO][5032] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" iface="eth0" netns="/var/run/netns/cni-ff84841d-0d3d-46a6-ef9a-5d2af0f7dbef" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.130 [INFO][5032] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.130 [INFO][5032] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.162 [INFO][5046] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" HandleID="k8s-pod-network.2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" Workload="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.162 [INFO][5046] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.162 [INFO][5046] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.169 [WARNING][5046] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" HandleID="k8s-pod-network.2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" Workload="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.169 [INFO][5046] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" HandleID="k8s-pod-network.2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" Workload="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.170 [INFO][5046] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:36.173971 env[1248]: 2025-05-10 01:02:36.172 [INFO][5032] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b" May 10 01:02:36.175690 env[1248]: time="2025-05-10T01:02:36.175334101Z" level=info msg="TearDown network for sandbox \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\" successfully" May 10 01:02:36.175690 env[1248]: time="2025-05-10T01:02:36.175348224Z" level=info msg="StopPodSandbox for \"2aae961ebec7c16921167db15608ac1fba1fd3996f973e826825772362abd65b\" returns successfully" May 10 01:02:36.175987 env[1248]: time="2025-05-10T01:02:36.175969501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5c86885d-x2ndc,Uid:6c24de29-5fd2-48e8-aadf-9db45ec25d51,Namespace:calico-apiserver,Attempt:1,}" May 10 01:02:36.211452 systemd[1]: run-netns-cni\x2dff84841d\x2d0d3d\x2d46a6\x2def9a\x2d5d2af0f7dbef.mount: Deactivated successfully. May 10 01:02:36.211504 systemd[1]: run-netns-cni\x2d3b139af8\x2dd195\x2d6420\x2da914\x2d01c6a4f26822.mount: Deactivated successfully. May 10 01:02:36.303043 systemd-networkd[1061]: cali704521b2abe: Link UP May 10 01:02:36.305272 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 01:02:36.305326 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali704521b2abe: link becomes ready May 10 01:02:36.305233 systemd-networkd[1061]: cali704521b2abe: Gained carrier May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.223 [INFO][5070] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0 calico-apiserver-7c5c86885d- calico-apiserver 6c24de29-5fd2-48e8-aadf-9db45ec25d51 1091 0 2025-05-10 01:01:17 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7c5c86885d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7c5c86885d-x2ndc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali704521b2abe [] []}} ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-x2ndc" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.223 [INFO][5070] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-x2ndc" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.244 [INFO][5083] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" HandleID="k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Workload="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.249 [INFO][5083] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" HandleID="k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Workload="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00048cb60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7c5c86885d-x2ndc", "timestamp":"2025-05-10 01:02:36.244235879 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.249 [INFO][5083] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.249 [INFO][5083] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.249 [INFO][5083] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.254 [INFO][5083] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.264 [INFO][5083] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.274 [INFO][5083] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.287 [INFO][5083] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.289 [INFO][5083] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.289 [INFO][5083] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.290 [INFO][5083] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72 May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.293 [INFO][5083] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.297 [INFO][5083] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.297 [INFO][5083] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" host="localhost" May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.297 [INFO][5083] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:36.316064 env[1248]: 2025-05-10 01:02:36.297 [INFO][5083] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" HandleID="k8s-pod-network.ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Workload="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.316566 env[1248]: 2025-05-10 01:02:36.299 [INFO][5070] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-x2ndc" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0", GenerateName:"calico-apiserver-7c5c86885d-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c24de29-5fd2-48e8-aadf-9db45ec25d51", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5c86885d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7c5c86885d-x2ndc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali704521b2abe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:36.316566 env[1248]: 2025-05-10 01:02:36.300 [INFO][5070] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-x2ndc" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.316566 env[1248]: 2025-05-10 01:02:36.300 [INFO][5070] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali704521b2abe ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-x2ndc" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.316566 env[1248]: 2025-05-10 01:02:36.305 [INFO][5070] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-x2ndc" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.316566 env[1248]: 2025-05-10 01:02:36.305 [INFO][5070] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-x2ndc" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0", GenerateName:"calico-apiserver-7c5c86885d-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c24de29-5fd2-48e8-aadf-9db45ec25d51", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5c86885d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72", Pod:"calico-apiserver-7c5c86885d-x2ndc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali704521b2abe", MAC:"f2:c9:63:4c:ec:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:36.316566 env[1248]: 2025-05-10 01:02:36.311 [INFO][5070] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-x2ndc" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--x2ndc-eth0" May 10 01:02:36.331734 env[1248]: time="2025-05-10T01:02:36.331690876Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:02:36.331820 env[1248]: time="2025-05-10T01:02:36.331739276Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:02:36.331820 env[1248]: time="2025-05-10T01:02:36.331754737Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:02:36.332115 env[1248]: time="2025-05-10T01:02:36.331904546Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72 pid=5116 runtime=io.containerd.runc.v2 May 10 01:02:36.345587 systemd[1]: Started cri-containerd-ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72.scope. May 10 01:02:36.354000 audit[5138]: NETFILTER_CFG table=filter:108 family=2 entries=52 op=nft_register_chain pid=5138 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:36.354000 audit[5138]: SYSCALL arch=c000003e syscall=46 success=yes exit=27056 a0=3 a1=7fffd395cae0 a2=0 a3=7fffd395cacc items=0 ppid=4317 pid=5138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:36.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.369000 audit: BPF prog-id=203 op=LOAD May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5116 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393863343531353839613262636163643931653635386539306432 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5116 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393863343531353839613262636163643931653635386539306432 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit: BPF prog-id=204 op=LOAD May 10 01:02:36.370000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025bce0 items=0 ppid=5116 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393863343531353839613262636163643931653635386539306432 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit: BPF prog-id=205 op=LOAD May 10 01:02:36.370000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025bd28 items=0 ppid=5116 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393863343531353839613262636163643931653635386539306432 May 10 01:02:36.370000 audit: BPF prog-id=205 op=UNLOAD May 10 01:02:36.370000 audit: BPF prog-id=204 op=UNLOAD May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { perfmon } for pid=5126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit[5126]: AVC avc: denied { bpf } for pid=5126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.370000 audit: BPF prog-id=206 op=LOAD May 10 01:02:36.370000 audit[5126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002e0138 items=0 ppid=5116 pid=5126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163393863343531353839613262636163643931653635386539306432 May 10 01:02:36.376353 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 01:02:36.398489 systemd-networkd[1061]: cali2091551374a: Link UP May 10 01:02:36.400111 systemd-networkd[1061]: cali2091551374a: Gained carrier May 10 01:02:36.400332 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2091551374a: link becomes ready May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.219 [INFO][5058] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0 calico-apiserver-7c5c86885d- calico-apiserver 41128e7d-a5aa-4fe4-bf46-b5240a85e276 1090 0 2025-05-10 01:01:17 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7c5c86885d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7c5c86885d-wtfct eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2091551374a [] []}} ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-wtfct" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.219 [INFO][5058] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-wtfct" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.251 [INFO][5085] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" HandleID="k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Workload="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.350 [INFO][5085] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" HandleID="k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Workload="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033ed50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7c5c86885d-wtfct", "timestamp":"2025-05-10 01:02:36.251932665 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.350 [INFO][5085] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.350 [INFO][5085] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.350 [INFO][5085] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.357 [INFO][5085] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.361 [INFO][5085] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.369 [INFO][5085] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.370 [INFO][5085] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.375 [INFO][5085] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.375 [INFO][5085] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.377 [INFO][5085] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75 May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.383 [INFO][5085] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.389 [INFO][5085] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.390 [INFO][5085] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" host="localhost" May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.390 [INFO][5085] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:36.409788 env[1248]: 2025-05-10 01:02:36.390 [INFO][5085] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" HandleID="k8s-pod-network.03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Workload="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.410616 env[1248]: 2025-05-10 01:02:36.391 [INFO][5058] cni-plugin/k8s.go 386: Populated endpoint ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-wtfct" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0", GenerateName:"calico-apiserver-7c5c86885d-", Namespace:"calico-apiserver", SelfLink:"", UID:"41128e7d-a5aa-4fe4-bf46-b5240a85e276", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5c86885d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7c5c86885d-wtfct", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2091551374a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:36.410616 env[1248]: 2025-05-10 01:02:36.391 [INFO][5058] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-wtfct" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.410616 env[1248]: 2025-05-10 01:02:36.391 [INFO][5058] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2091551374a ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-wtfct" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.410616 env[1248]: 2025-05-10 01:02:36.399 [INFO][5058] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-wtfct" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.410616 env[1248]: 2025-05-10 01:02:36.399 [INFO][5058] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-wtfct" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0", GenerateName:"calico-apiserver-7c5c86885d-", Namespace:"calico-apiserver", SelfLink:"", UID:"41128e7d-a5aa-4fe4-bf46-b5240a85e276", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c5c86885d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75", Pod:"calico-apiserver-7c5c86885d-wtfct", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2091551374a", MAC:"96:b0:e2:ca:af:8a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:36.410616 env[1248]: 2025-05-10 01:02:36.405 [INFO][5058] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75" Namespace="calico-apiserver" Pod="calico-apiserver-7c5c86885d-wtfct" WorkloadEndpoint="localhost-k8s-calico--apiserver--7c5c86885d--wtfct-eth0" May 10 01:02:36.411390 env[1248]: time="2025-05-10T01:02:36.411370252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5c86885d-x2ndc,Uid:6c24de29-5fd2-48e8-aadf-9db45ec25d51,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72\"" May 10 01:02:36.424599 env[1248]: time="2025-05-10T01:02:36.424559390Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:02:36.424707 env[1248]: time="2025-05-10T01:02:36.424584214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:02:36.424707 env[1248]: time="2025-05-10T01:02:36.424600847Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:02:36.424940 env[1248]: time="2025-05-10T01:02:36.424889104Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75 pid=5176 runtime=io.containerd.runc.v2 May 10 01:02:36.436803 systemd[1]: Started cri-containerd-03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75.scope. May 10 01:02:36.443000 audit[5203]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=5203 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:36.443000 audit[5203]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffcf44bbaa0 a2=0 a3=7ffcf44bba8c items=0 ppid=4317 pid=5203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.443000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:36.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit: BPF prog-id=207 op=LOAD May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=5176 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653635643334343532313532663435386264633933396530663264 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=5176 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653635643334343532313532663435386264633933396530663264 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit: BPF prog-id=208 op=LOAD May 10 01:02:36.446000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002cbce0 items=0 ppid=5176 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653635643334343532313532663435386264633933396530663264 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.446000 audit: BPF prog-id=209 op=LOAD May 10 01:02:36.446000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002cbd28 items=0 ppid=5176 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653635643334343532313532663435386264633933396530663264 May 10 01:02:36.446000 audit: BPF prog-id=209 op=UNLOAD May 10 01:02:36.446000 audit: BPF prog-id=208 op=UNLOAD May 10 01:02:36.447000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:36.447000 audit: BPF prog-id=210 op=LOAD May 10 01:02:36.447000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ce138 items=0 ppid=5176 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:36.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653635643334343532313532663435386264633933396530663264 May 10 01:02:36.449470 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 01:02:36.467682 env[1248]: time="2025-05-10T01:02:36.467648772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c5c86885d-wtfct,Uid:41128e7d-a5aa-4fe4-bf46-b5240a85e276,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75\"" May 10 01:02:37.210781 systemd[1]: run-containerd-runc-k8s.io-03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75-runc.2nqJTM.mount: Deactivated successfully. May 10 01:02:37.417626 systemd-networkd[1061]: cali704521b2abe: Gained IPv6LL May 10 01:02:37.482008 env[1248]: time="2025-05-10T01:02:37.481727068Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:37.482519 env[1248]: time="2025-05-10T01:02:37.482496800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:37.483554 env[1248]: time="2025-05-10T01:02:37.483199041Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:37.483912 env[1248]: time="2025-05-10T01:02:37.483899427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:37.484215 env[1248]: time="2025-05-10T01:02:37.484200263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 01:02:37.485185 env[1248]: time="2025-05-10T01:02:37.485157816Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 01:02:37.486806 env[1248]: time="2025-05-10T01:02:37.486789691Z" level=info msg="CreateContainer within sandbox \"938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 01:02:37.495921 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4003271613.mount: Deactivated successfully. May 10 01:02:37.505123 env[1248]: time="2025-05-10T01:02:37.505100870Z" level=info msg="CreateContainer within sandbox \"938c5300541c2edb46bfb0a51aca64dbd1eed7f4e85598133ae390d844007bb9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"64dff00aefcdd5b843d007d747dde98c6a0993b0a937680c7d5bfaaf3e5ce708\"" May 10 01:02:37.506344 env[1248]: time="2025-05-10T01:02:37.506322672Z" level=info msg="StartContainer for \"64dff00aefcdd5b843d007d747dde98c6a0993b0a937680c7d5bfaaf3e5ce708\"" May 10 01:02:37.523500 systemd[1]: Started cri-containerd-64dff00aefcdd5b843d007d747dde98c6a0993b0a937680c7d5bfaaf3e5ce708.scope. May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f62e84f0888 items=0 ppid=4825 pid=5219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:37.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634646666303061656663646435623834336430303764373437646465 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit: BPF prog-id=211 op=LOAD May 10 01:02:37.534000 audit[5219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000355dd8 items=0 ppid=4825 pid=5219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:37.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634646666303061656663646435623834336430303764373437646465 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit: BPF prog-id=212 op=LOAD May 10 01:02:37.534000 audit[5219]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000355e28 items=0 ppid=4825 pid=5219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:37.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634646666303061656663646435623834336430303764373437646465 May 10 01:02:37.534000 audit: BPF prog-id=212 op=UNLOAD May 10 01:02:37.534000 audit: BPF prog-id=211 op=UNLOAD May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { perfmon } for pid=5219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit[5219]: AVC avc: denied { bpf } for pid=5219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:37.534000 audit: BPF prog-id=213 op=LOAD May 10 01:02:37.534000 audit[5219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000355eb8 items=0 ppid=4825 pid=5219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:37.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634646666303061656663646435623834336430303764373437646465 May 10 01:02:37.554560 env[1248]: time="2025-05-10T01:02:37.554537387Z" level=info msg="StartContainer for \"64dff00aefcdd5b843d007d747dde98c6a0993b0a937680c7d5bfaaf3e5ce708\" returns successfully" May 10 01:02:38.076266 env[1248]: time="2025-05-10T01:02:38.076238218Z" level=info msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\"" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.112 [INFO][5260] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.112 [INFO][5260] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" iface="eth0" netns="/var/run/netns/cni-cf947b93-fca4-66c6-e01b-24fe3ad54242" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.112 [INFO][5260] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" iface="eth0" netns="/var/run/netns/cni-cf947b93-fca4-66c6-e01b-24fe3ad54242" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.112 [INFO][5260] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" iface="eth0" netns="/var/run/netns/cni-cf947b93-fca4-66c6-e01b-24fe3ad54242" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.112 [INFO][5260] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.112 [INFO][5260] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.128 [INFO][5268] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" HandleID="k8s-pod-network.e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" Workload="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.128 [INFO][5268] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.128 [INFO][5268] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.132 [WARNING][5268] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" HandleID="k8s-pod-network.e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" Workload="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.132 [INFO][5268] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" HandleID="k8s-pod-network.e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" Workload="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.133 [INFO][5268] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:38.136278 env[1248]: 2025-05-10 01:02:38.135 [INFO][5260] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15" May 10 01:02:38.136662 env[1248]: time="2025-05-10T01:02:38.136426045Z" level=info msg="TearDown network for sandbox \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\" successfully" May 10 01:02:38.136662 env[1248]: time="2025-05-10T01:02:38.136448190Z" level=info msg="StopPodSandbox for \"e2a19ffcb24848ccc2df35cc05800b32915fea29ae42f40de523ba767f712e15\" returns successfully" May 10 01:02:38.136857 env[1248]: time="2025-05-10T01:02:38.136842705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-smvpz,Uid:677c37f1-d746-4690-85e1-7fe9cdc46ac3,Namespace:kube-system,Attempt:1,}" May 10 01:02:38.211011 systemd[1]: run-containerd-runc-k8s.io-64dff00aefcdd5b843d007d747dde98c6a0993b0a937680c7d5bfaaf3e5ce708-runc.GuglRA.mount: Deactivated successfully. May 10 01:02:38.211075 systemd[1]: run-netns-cni\x2dcf947b93\x2dfca4\x2d66c6\x2de01b\x2d24fe3ad54242.mount: Deactivated successfully. May 10 01:02:38.232382 systemd-networkd[1061]: cali4ebd027bbf4: Link UP May 10 01:02:38.234557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 01:02:38.234597 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4ebd027bbf4: link becomes ready May 10 01:02:38.234665 systemd-networkd[1061]: cali4ebd027bbf4: Gained carrier May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.158 [INFO][5274] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--smvpz-eth0 coredns-6f6b679f8f- kube-system 677c37f1-d746-4690-85e1-7fe9cdc46ac3 1112 0 2025-05-10 01:01:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-smvpz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4ebd027bbf4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Namespace="kube-system" Pod="coredns-6f6b679f8f-smvpz" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--smvpz-" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.158 [INFO][5274] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Namespace="kube-system" Pod="coredns-6f6b679f8f-smvpz" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.175 [INFO][5287] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" HandleID="k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Workload="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.181 [INFO][5287] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" HandleID="k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Workload="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290f30), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-smvpz", "timestamp":"2025-05-10 01:02:38.175607824 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.181 [INFO][5287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.181 [INFO][5287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.181 [INFO][5287] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.182 [INFO][5287] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.184 [INFO][5287] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.186 [INFO][5287] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.189 [INFO][5287] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.195 [INFO][5287] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.195 [INFO][5287] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.200 [INFO][5287] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734 May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.213 [INFO][5287] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.229 [INFO][5287] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.229 [INFO][5287] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" host="localhost" May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.229 [INFO][5287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 01:02:38.257691 env[1248]: 2025-05-10 01:02:38.229 [INFO][5287] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" HandleID="k8s-pod-network.7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Workload="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.258534 env[1248]: 2025-05-10 01:02:38.230 [INFO][5274] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Namespace="kube-system" Pod="coredns-6f6b679f8f-smvpz" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--smvpz-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"677c37f1-d746-4690-85e1-7fe9cdc46ac3", ResourceVersion:"1112", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-smvpz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ebd027bbf4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:38.258534 env[1248]: 2025-05-10 01:02:38.230 [INFO][5274] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Namespace="kube-system" Pod="coredns-6f6b679f8f-smvpz" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.258534 env[1248]: 2025-05-10 01:02:38.230 [INFO][5274] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4ebd027bbf4 ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Namespace="kube-system" Pod="coredns-6f6b679f8f-smvpz" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.258534 env[1248]: 2025-05-10 01:02:38.232 [INFO][5274] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Namespace="kube-system" Pod="coredns-6f6b679f8f-smvpz" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.258534 env[1248]: 2025-05-10 01:02:38.235 [INFO][5274] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Namespace="kube-system" Pod="coredns-6f6b679f8f-smvpz" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--smvpz-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"677c37f1-d746-4690-85e1-7fe9cdc46ac3", ResourceVersion:"1112", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 1, 1, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734", Pod:"coredns-6f6b679f8f-smvpz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ebd027bbf4", MAC:"fa:af:f4:a7:ee:16", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 01:02:38.258534 env[1248]: 2025-05-10 01:02:38.256 [INFO][5274] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734" Namespace="kube-system" Pod="coredns-6f6b679f8f-smvpz" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--smvpz-eth0" May 10 01:02:38.266179 env[1248]: time="2025-05-10T01:02:38.266125875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 01:02:38.266179 env[1248]: time="2025-05-10T01:02:38.266180026Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 01:02:38.266309 env[1248]: time="2025-05-10T01:02:38.266195367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 01:02:38.266340 env[1248]: time="2025-05-10T01:02:38.266312663Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734 pid=5311 runtime=io.containerd.runc.v2 May 10 01:02:38.282570 systemd[1]: Started cri-containerd-7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734.scope. May 10 01:02:38.303935 kubelet[2100]: I0510 01:02:38.297363 2100 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 01:02:38.305349 kubelet[2100]: I0510 01:02:38.305336 2100 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 01:02:38.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit: BPF prog-id=214 op=LOAD May 10 01:02:38.305000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5311 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323737313161366435643263376239383539323462346234343462 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5311 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323737313161366435643263376239383539323462346234343462 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.305000 audit: BPF prog-id=215 op=LOAD May 10 01:02:38.305000 audit[5320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002061a0 items=0 ppid=5311 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323737313161366435643263376239383539323462346234343462 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit: BPF prog-id=216 op=LOAD May 10 01:02:38.306000 audit[5320]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002061e8 items=0 ppid=5311 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323737313161366435643263376239383539323462346234343462 May 10 01:02:38.306000 audit: BPF prog-id=216 op=UNLOAD May 10 01:02:38.306000 audit: BPF prog-id=215 op=UNLOAD May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { perfmon } for pid=5320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit[5320]: AVC avc: denied { bpf } for pid=5320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.306000 audit: BPF prog-id=217 op=LOAD May 10 01:02:38.306000 audit[5320]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002065f8 items=0 ppid=5311 pid=5320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764323737313161366435643263376239383539323462346234343462 May 10 01:02:38.305000 audit[5338]: NETFILTER_CFG table=filter:110 family=2 entries=46 op=nft_register_chain pid=5338 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 01:02:38.305000 audit[5338]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7ffce40233d0 a2=0 a3=7ffce40233bc items=0 ppid=4317 pid=5338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.305000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 01:02:38.308550 systemd-resolved[1195]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 10 01:02:38.313361 systemd-networkd[1061]: cali2091551374a: Gained IPv6LL May 10 01:02:38.340633 env[1248]: time="2025-05-10T01:02:38.339164210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-smvpz,Uid:677c37f1-d746-4690-85e1-7fe9cdc46ac3,Namespace:kube-system,Attempt:1,} returns sandbox id \"7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734\"" May 10 01:02:38.348780 env[1248]: time="2025-05-10T01:02:38.348673412Z" level=info msg="CreateContainer within sandbox \"7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 01:02:38.383089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount630996119.mount: Deactivated successfully. May 10 01:02:38.384666 env[1248]: time="2025-05-10T01:02:38.384644539Z" level=info msg="CreateContainer within sandbox \"7d27711a6d5d2c7b985924b4b444b25985371ddd13347d7f6b6c6dae84326734\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5796fd66b7ae25964b38b0ba0f515432f0f8f1064991c9c4174f4751baba656c\"" May 10 01:02:38.386663 env[1248]: time="2025-05-10T01:02:38.386458061Z" level=info msg="StartContainer for \"5796fd66b7ae25964b38b0ba0f515432f0f8f1064991c9c4174f4751baba656c\"" May 10 01:02:38.404778 systemd[1]: Started cri-containerd-5796fd66b7ae25964b38b0ba0f515432f0f8f1064991c9c4174f4751baba656c.scope. May 10 01:02:38.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.421000 audit: BPF prog-id=218 op=LOAD May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5311 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393666643636623761653235393634623338623062613066353135 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=5311 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393666643636623761653235393634623338623062613066353135 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit: BPF prog-id=219 op=LOAD May 10 01:02:38.422000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000399270 items=0 ppid=5311 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393666643636623761653235393634623338623062613066353135 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit: BPF prog-id=220 op=LOAD May 10 01:02:38.422000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003992b8 items=0 ppid=5311 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393666643636623761653235393634623338623062613066353135 May 10 01:02:38.422000 audit: BPF prog-id=220 op=UNLOAD May 10 01:02:38.422000 audit: BPF prog-id=219 op=UNLOAD May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:38.422000 audit: BPF prog-id=221 op=LOAD May 10 01:02:38.422000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003996c8 items=0 ppid=5311 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:38.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393666643636623761653235393634623338623062613066353135 May 10 01:02:38.431476 env[1248]: time="2025-05-10T01:02:38.431452920Z" level=info msg="StartContainer for \"5796fd66b7ae25964b38b0ba0f515432f0f8f1064991c9c4174f4751baba656c\" returns successfully" May 10 01:02:39.419730 kubelet[2100]: I0510 01:02:39.415998 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9qdlp" podStartSLOduration=78.316659089 podStartE2EDuration="1m21.413819895s" podCreationTimestamp="2025-05-10 01:01:18 +0000 UTC" firstStartedPulling="2025-05-10 01:02:34.387607137 +0000 UTC m=+87.419577721" lastFinishedPulling="2025-05-10 01:02:37.484767948 +0000 UTC m=+90.516738527" observedRunningTime="2025-05-10 01:02:38.417411139 +0000 UTC m=+91.449381729" watchObservedRunningTime="2025-05-10 01:02:39.413819895 +0000 UTC m=+92.445790494" May 10 01:02:39.429000 audit[5386]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=5386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:39.429000 audit[5386]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff18d37b80 a2=0 a3=7fff18d37b6c items=0 ppid=2232 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:39.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:39.435000 audit[5386]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=5386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:39.435000 audit[5386]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff18d37b80 a2=0 a3=7fff18d37b6c items=0 ppid=2232 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:39.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:39.466381 systemd-networkd[1061]: cali4ebd027bbf4: Gained IPv6LL May 10 01:02:39.564580 kubelet[2100]: I0510 01:02:39.562227 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-smvpz" podStartSLOduration=87.562214271 podStartE2EDuration="1m27.562214271s" podCreationTimestamp="2025-05-10 01:01:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 01:02:39.420153105 +0000 UTC m=+92.452123694" watchObservedRunningTime="2025-05-10 01:02:39.562214271 +0000 UTC m=+92.594184856" May 10 01:02:39.577000 audit[5388]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:39.577000 audit[5388]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd8e5ea890 a2=0 a3=7ffd8e5ea87c items=0 ppid=2232 pid=5388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:39.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:39.611000 audit[5388]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=5388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:39.611000 audit[5388]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd8e5ea890 a2=0 a3=7ffd8e5ea87c items=0 ppid=2232 pid=5388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:39.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:40.813702 env[1248]: time="2025-05-10T01:02:40.813665593Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:40.817317 env[1248]: time="2025-05-10T01:02:40.817299957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:40.818705 env[1248]: time="2025-05-10T01:02:40.818687786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:40.819835 env[1248]: time="2025-05-10T01:02:40.819817211Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:40.820126 env[1248]: time="2025-05-10T01:02:40.820106991Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 01:02:40.831635 env[1248]: time="2025-05-10T01:02:40.831615562Z" level=info msg="CreateContainer within sandbox \"ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 01:02:40.832214 env[1248]: time="2025-05-10T01:02:40.831261401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 01:02:40.841458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3096024430.mount: Deactivated successfully. May 10 01:02:40.842630 env[1248]: time="2025-05-10T01:02:40.842614338Z" level=info msg="CreateContainer within sandbox \"ac98c451589a2bcacd91e658e90d2edf8d254eab310c91e4e446581b0449ab72\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2d57a59bedbd1aa6a2199ba4a0c1e3a0fa6645367603b5d663c068f4e38ad084\"" May 10 01:02:40.843044 env[1248]: time="2025-05-10T01:02:40.843026976Z" level=info msg="StartContainer for \"2d57a59bedbd1aa6a2199ba4a0c1e3a0fa6645367603b5d663c068f4e38ad084\"" May 10 01:02:40.862605 systemd[1]: Started cri-containerd-2d57a59bedbd1aa6a2199ba4a0c1e3a0fa6645367603b5d663c068f4e38ad084.scope. May 10 01:02:40.884630 kernel: kauditd_printk_skb: 348 callbacks suppressed May 10 01:02:40.884701 kernel: audit: type=1400 audit(1746838960.877:1428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.885169 kernel: audit: type=1400 audit(1746838960.877:1429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.891387 kernel: audit: type=1400 audit(1746838960.877:1430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.894046 kernel: audit: type=1400 audit(1746838960.877:1431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.894071 kernel: audit: type=1400 audit(1746838960.877:1432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.896533 kernel: audit: type=1400 audit(1746838960.877:1433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.899093 kernel: audit: type=1400 audit(1746838960.877:1434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.905240 kernel: audit: type=1400 audit(1746838960.877:1435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.905270 kernel: audit: type=1400 audit(1746838960.877:1436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.880000 audit: BPF prog-id=222 op=LOAD May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=5116 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:40.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353761353962656462643161613661323139396261346130633165 May 10 01:02:40.908571 kernel: audit: type=1400 audit(1746838960.880:1437): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=5116 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:40.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353761353962656462643161613661323139396261346130633165 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit: BPF prog-id=223 op=LOAD May 10 01:02:40.884000 audit[5398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000347cf0 items=0 ppid=5116 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:40.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353761353962656462643161613661323139396261346130633165 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit: BPF prog-id=224 op=LOAD May 10 01:02:40.884000 audit[5398]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000347d38 items=0 ppid=5116 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:40.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353761353962656462643161613661323139396261346130633165 May 10 01:02:40.884000 audit: BPF prog-id=224 op=UNLOAD May 10 01:02:40.884000 audit: BPF prog-id=223 op=UNLOAD May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { perfmon } for pid=5398 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit[5398]: AVC avc: denied { bpf } for pid=5398 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:40.884000 audit: BPF prog-id=225 op=LOAD May 10 01:02:40.884000 audit[5398]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003b6148 items=0 ppid=5116 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:40.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264353761353962656462643161613661323139396261346130633165 May 10 01:02:40.918471 env[1248]: time="2025-05-10T01:02:40.918451275Z" level=info msg="StartContainer for \"2d57a59bedbd1aa6a2199ba4a0c1e3a0fa6645367603b5d663c068f4e38ad084\" returns successfully" May 10 01:02:41.067681 systemd[1]: Started sshd@15-139.178.70.100:22-139.178.89.65:35306.service. May 10 01:02:41.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-139.178.89.65:35306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:41.138000 audit[5430]: USER_ACCT pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.139000 audit[5430]: CRED_ACQ pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.139000 audit[5430]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed1cafa70 a2=3 a3=0 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.139000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:41.141482 sshd[5430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:41.141970 sshd[5430]: Accepted publickey for core from 139.178.89.65 port 35306 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:41.146055 systemd-logind[1241]: New session 18 of user core. May 10 01:02:41.146568 systemd[1]: Started session-18.scope. May 10 01:02:41.148000 audit[5430]: USER_START pid=5430 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.149000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.234089 env[1248]: time="2025-05-10T01:02:41.234066077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:41.235246 env[1248]: time="2025-05-10T01:02:41.235232146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:41.236047 env[1248]: time="2025-05-10T01:02:41.236030823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:41.237172 env[1248]: time="2025-05-10T01:02:41.237158933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 01:02:41.237406 env[1248]: time="2025-05-10T01:02:41.237392263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 01:02:41.242998 env[1248]: time="2025-05-10T01:02:41.242982431Z" level=info msg="CreateContainer within sandbox \"03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 01:02:41.251667 env[1248]: time="2025-05-10T01:02:41.251643322Z" level=info msg="CreateContainer within sandbox \"03e65d34452152f458bdc939e0f2d9699742168a7d9412b8c19b735d42485c75\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2a50c5e8fe76d455bb2dbac1beb0e40cdaa87e14661968a9ae119507961149b9\"" May 10 01:02:41.252154 env[1248]: time="2025-05-10T01:02:41.252140633Z" level=info msg="StartContainer for \"2a50c5e8fe76d455bb2dbac1beb0e40cdaa87e14661968a9ae119507961149b9\"" May 10 01:02:41.269492 systemd[1]: Started cri-containerd-2a50c5e8fe76d455bb2dbac1beb0e40cdaa87e14661968a9ae119507961149b9.scope. May 10 01:02:41.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit: BPF prog-id=226 op=LOAD May 10 01:02:41.296000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5176 pid=5444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353063356538666537366434353562623264626163316265623065 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5176 pid=5444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353063356538666537366434353562623264626163316265623065 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.296000 audit: BPF prog-id=227 op=LOAD May 10 01:02:41.296000 audit[5444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ba20 items=0 ppid=5176 pid=5444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353063356538666537366434353562623264626163316265623065 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit: BPF prog-id=228 op=LOAD May 10 01:02:41.297000 audit[5444]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028ba68 items=0 ppid=5176 pid=5444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353063356538666537366434353562623264626163316265623065 May 10 01:02:41.297000 audit: BPF prog-id=228 op=UNLOAD May 10 01:02:41.297000 audit: BPF prog-id=227 op=UNLOAD May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { perfmon } for pid=5444 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit[5444]: AVC avc: denied { bpf } for pid=5444 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 01:02:41.297000 audit: BPF prog-id=229 op=LOAD May 10 01:02:41.297000 audit[5444]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028be78 items=0 ppid=5176 pid=5444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261353063356538666537366434353562623264626163316265623065 May 10 01:02:41.327850 env[1248]: time="2025-05-10T01:02:41.325398147Z" level=info msg="StartContainer for \"2a50c5e8fe76d455bb2dbac1beb0e40cdaa87e14661968a9ae119507961149b9\" returns successfully" May 10 01:02:41.486000 audit[5408]: AVC avc: denied { watch } for pid=5408 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_01_01_29.3223740659/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c153,c552 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c153,c552 tclass=file permissive=0 May 10 01:02:41.486000 audit[5408]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e8f680 a2=fc6 a3=0 items=0 ppid=5116 pid=5408 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c153,c552 key=(null) May 10 01:02:41.486000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 01:02:41.573000 audit[5479]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:41.573000 audit[5479]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc0b3758c0 a2=0 a3=7ffc0b3758ac items=0 ppid=2232 pid=5479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:41.578000 audit[5479]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5479 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:41.578000 audit[5479]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc0b3758c0 a2=0 a3=7ffc0b3758ac items=0 ppid=2232 pid=5479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:41.637082 kubelet[2100]: I0510 01:02:41.637041 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7c5c86885d-wtfct" podStartSLOduration=79.855539814 podStartE2EDuration="1m24.629133868s" podCreationTimestamp="2025-05-10 01:01:17 +0000 UTC" firstStartedPulling="2025-05-10 01:02:36.468298445 +0000 UTC m=+89.500269027" lastFinishedPulling="2025-05-10 01:02:41.241892503 +0000 UTC m=+94.273863081" observedRunningTime="2025-05-10 01:02:41.543946224 +0000 UTC m=+94.575916813" watchObservedRunningTime="2025-05-10 01:02:41.629133868 +0000 UTC m=+94.661104453" May 10 01:02:41.639533 kubelet[2100]: I0510 01:02:41.639510 2100 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7c5c86885d-x2ndc" podStartSLOduration=80.225345465 podStartE2EDuration="1m24.639502118s" podCreationTimestamp="2025-05-10 01:01:17 +0000 UTC" firstStartedPulling="2025-05-10 01:02:36.41446268 +0000 UTC m=+89.446433260" lastFinishedPulling="2025-05-10 01:02:40.82861933 +0000 UTC m=+93.860589913" observedRunningTime="2025-05-10 01:02:41.549409304 +0000 UTC m=+94.581379895" watchObservedRunningTime="2025-05-10 01:02:41.639502118 +0000 UTC m=+94.671472702" May 10 01:02:41.839186 sshd[5430]: pam_unix(sshd:session): session closed for user core May 10 01:02:41.842048 systemd[1]: run-containerd-runc-k8s.io-2d57a59bedbd1aa6a2199ba4a0c1e3a0fa6645367603b5d663c068f4e38ad084-runc.ADOvLW.mount: Deactivated successfully. May 10 01:02:41.842000 audit[5430]: USER_END pid=5430 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.842000 audit[5430]: CRED_DISP pid=5430 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.846664 systemd[1]: sshd@15-139.178.70.100:22-139.178.89.65:35306.service: Deactivated successfully. May 10 01:02:41.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-139.178.89.65:35306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:41.847865 systemd[1]: session-18.scope: Deactivated successfully. May 10 01:02:41.848266 systemd-logind[1241]: Session 18 logged out. Waiting for processes to exit. May 10 01:02:41.849071 systemd[1]: Started sshd@16-139.178.70.100:22-139.178.89.65:35318.service. May 10 01:02:41.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-139.178.89.65:35318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:41.850362 systemd-logind[1241]: Removed session 18. May 10 01:02:41.893000 audit[5483]: USER_ACCT pid=5483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.893000 audit[5483]: CRED_ACQ pid=5483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.893000 audit[5483]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff18e68890 a2=3 a3=0 items=0 ppid=1 pid=5483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:41.893000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:41.895388 sshd[5483]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:41.896218 sshd[5483]: Accepted publickey for core from 139.178.89.65 port 35318 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:41.904819 systemd-logind[1241]: New session 19 of user core. May 10 01:02:41.905336 systemd[1]: Started session-19.scope. May 10 01:02:41.907000 audit[5483]: USER_START pid=5483 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:41.908000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:42.095000 audit[5454]: AVC avc: denied { watch } for pid=5454 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_01_01_29.61407117/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c291 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c291 tclass=file permissive=0 May 10 01:02:42.095000 audit[5454]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004890e0 a2=fc6 a3=0 items=0 ppid=5176 pid=5454 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c291 key=(null) May 10 01:02:42.095000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 01:02:42.184000 audit[5491]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=5491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:42.184000 audit[5491]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc7342beb0 a2=0 a3=7ffc7342be9c items=0 ppid=2232 pid=5491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:42.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:42.189000 audit[5491]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=5491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:42.189000 audit[5491]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc7342beb0 a2=0 a3=7ffc7342be9c items=0 ppid=2232 pid=5491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:42.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:42.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-139.178.89.65:35332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:42.463867 systemd[1]: Started sshd@17-139.178.70.100:22-139.178.89.65:35332.service. May 10 01:02:42.469556 sshd[5483]: pam_unix(sshd:session): session closed for user core May 10 01:02:42.469000 audit[5483]: USER_END pid=5483 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:42.471000 audit[5483]: CRED_DISP pid=5483 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:42.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-139.178.89.65:35318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:42.487580 systemd[1]: sshd@16-139.178.70.100:22-139.178.89.65:35318.service: Deactivated successfully. May 10 01:02:42.488091 systemd[1]: session-19.scope: Deactivated successfully. May 10 01:02:42.489711 systemd-logind[1241]: Session 19 logged out. Waiting for processes to exit. May 10 01:02:42.490501 systemd-logind[1241]: Removed session 19. May 10 01:02:42.545000 audit[5493]: USER_ACCT pid=5493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:42.546000 audit[5493]: CRED_ACQ pid=5493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:42.546000 audit[5493]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd95a2a280 a2=3 a3=0 items=0 ppid=1 pid=5493 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:42.546000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:42.548342 sshd[5493]: Accepted publickey for core from 139.178.89.65 port 35332 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:42.547840 sshd[5493]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:42.554248 systemd[1]: Started session-20.scope. May 10 01:02:42.555252 systemd-logind[1241]: New session 20 of user core. May 10 01:02:42.559000 audit[5493]: USER_START pid=5493 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:42.560000 audit[5496]: CRED_ACQ pid=5496 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:42.613000 audit[5503]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=5503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:42.613000 audit[5503]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcfa005f40 a2=0 a3=7ffcfa005f2c items=0 ppid=2232 pid=5503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:42.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:42.621000 audit[5503]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=5503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:42.621000 audit[5503]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcfa005f40 a2=0 a3=7ffcfa005f2c items=0 ppid=2232 pid=5503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:42.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:44.307000 audit[5516]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:44.307000 audit[5516]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffc8d79620 a2=0 a3=7fffc8d7960c items=0 ppid=2232 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:44.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:44.313000 audit[5516]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:44.313000 audit[5516]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffc8d79620 a2=0 a3=7fffc8d7960c items=0 ppid=2232 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:44.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:44.320000 audit[5493]: USER_END pid=5493 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:44.320000 audit[5493]: CRED_DISP pid=5493 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:44.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-139.178.89.65:35332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:44.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-139.178.89.65:35336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:44.319956 sshd[5493]: pam_unix(sshd:session): session closed for user core May 10 01:02:44.325482 systemd[1]: sshd@17-139.178.70.100:22-139.178.89.65:35332.service: Deactivated successfully. May 10 01:02:44.325857 systemd[1]: session-20.scope: Deactivated successfully. May 10 01:02:44.327142 systemd-logind[1241]: Session 20 logged out. Waiting for processes to exit. May 10 01:02:44.338160 systemd[1]: Started sshd@18-139.178.70.100:22-139.178.89.65:35336.service. May 10 01:02:44.339101 systemd-logind[1241]: Removed session 20. May 10 01:02:44.412000 audit[5519]: USER_ACCT pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:44.412000 audit[5519]: CRED_ACQ pid=5519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:44.412000 audit[5519]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1c511610 a2=3 a3=0 items=0 ppid=1 pid=5519 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:44.412000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:44.417167 sshd[5519]: Accepted publickey for core from 139.178.89.65 port 35336 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:44.414653 sshd[5519]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:44.418464 systemd[1]: Started session-21.scope. May 10 01:02:44.419532 systemd-logind[1241]: New session 21 of user core. May 10 01:02:44.424000 audit[5519]: USER_START pid=5519 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:44.425000 audit[5521]: CRED_ACQ pid=5521 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.323501 sshd[5519]: pam_unix(sshd:session): session closed for user core May 10 01:02:45.325000 audit[5519]: USER_END pid=5519 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.325000 audit[5519]: CRED_DISP pid=5519 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-139.178.89.65:35346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:45.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-139.178.89.65:35336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:45.327662 systemd[1]: Started sshd@19-139.178.70.100:22-139.178.89.65:35346.service. May 10 01:02:45.328808 systemd[1]: sshd@18-139.178.70.100:22-139.178.89.65:35336.service: Deactivated successfully. May 10 01:02:45.329491 systemd[1]: session-21.scope: Deactivated successfully. May 10 01:02:45.330064 systemd-logind[1241]: Session 21 logged out. Waiting for processes to exit. May 10 01:02:45.330644 systemd-logind[1241]: Removed session 21. May 10 01:02:45.347000 audit[5532]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:45.347000 audit[5532]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff466124b0 a2=0 a3=7fff4661249c items=0 ppid=2232 pid=5532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:45.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:45.352000 audit[5532]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:45.352000 audit[5532]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff466124b0 a2=0 a3=0 items=0 ppid=2232 pid=5532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:45.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:45.399000 audit[5530]: USER_ACCT pid=5530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.400944 sshd[5530]: Accepted publickey for core from 139.178.89.65 port 35346 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:45.400000 audit[5530]: CRED_ACQ pid=5530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.400000 audit[5530]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7b7ec150 a2=3 a3=0 items=0 ppid=1 pid=5530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:45.400000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:45.401665 sshd[5530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:45.406276 systemd[1]: Started session-22.scope. May 10 01:02:45.406576 systemd-logind[1241]: New session 22 of user core. May 10 01:02:45.409000 audit[5530]: USER_START pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.410000 audit[5534]: CRED_ACQ pid=5534 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.538022 sshd[5530]: pam_unix(sshd:session): session closed for user core May 10 01:02:45.537000 audit[5530]: USER_END pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.537000 audit[5530]: CRED_DISP pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:45.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-139.178.89.65:35346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:45.539628 systemd[1]: sshd@19-139.178.70.100:22-139.178.89.65:35346.service: Deactivated successfully. May 10 01:02:45.540110 systemd[1]: session-22.scope: Deactivated successfully. May 10 01:02:45.540745 systemd-logind[1241]: Session 22 logged out. Waiting for processes to exit. May 10 01:02:45.541245 systemd-logind[1241]: Removed session 22. May 10 01:02:49.332000 audit[5553]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:49.336907 kernel: kauditd_printk_skb: 195 callbacks suppressed May 10 01:02:49.345763 kernel: audit: type=1325 audit(1746838969.332:1521): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:49.349520 kernel: audit: type=1300 audit(1746838969.332:1521): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdc29ff550 a2=0 a3=7ffdc29ff53c items=0 ppid=2232 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:49.349548 kernel: audit: type=1327 audit(1746838969.332:1521): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:49.349565 kernel: audit: type=1325 audit(1746838969.341:1522): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:49.351538 kernel: audit: type=1300 audit(1746838969.341:1522): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdc29ff550 a2=0 a3=7ffdc29ff53c items=0 ppid=2232 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:49.351575 kernel: audit: type=1327 audit(1746838969.341:1522): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:49.332000 audit[5553]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdc29ff550 a2=0 a3=7ffdc29ff53c items=0 ppid=2232 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:49.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:49.341000 audit[5553]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 01:02:49.341000 audit[5553]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdc29ff550 a2=0 a3=7ffdc29ff53c items=0 ppid=2232 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:49.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 01:02:50.549630 systemd[1]: Started sshd@20-139.178.70.100:22-139.178.89.65:47014.service. May 10 01:02:50.555513 kernel: audit: type=1130 audit(1746838970.548:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-139.178.89.65:47014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:50.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-139.178.89.65:47014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:50.637000 audit[5576]: USER_ACCT pid=5576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:50.643192 sshd[5576]: Accepted publickey for core from 139.178.89.65 port 47014 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:50.644616 kernel: audit: type=1101 audit(1746838970.637:1524): pid=5576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:50.643000 audit[5576]: CRED_ACQ pid=5576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:50.651530 kernel: audit: type=1103 audit(1746838970.643:1525): pid=5576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:50.651567 kernel: audit: type=1006 audit(1746838970.647:1526): pid=5576 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 01:02:50.647000 audit[5576]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c269e80 a2=3 a3=0 items=0 ppid=1 pid=5576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:50.647000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:50.651884 sshd[5576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:50.658083 systemd-logind[1241]: New session 23 of user core. May 10 01:02:50.658601 systemd[1]: Started session-23.scope. May 10 01:02:50.661000 audit[5576]: USER_START pid=5576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:50.662000 audit[5578]: CRED_ACQ pid=5578 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:50.963342 sshd[5576]: pam_unix(sshd:session): session closed for user core May 10 01:02:50.962000 audit[5576]: USER_END pid=5576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:50.963000 audit[5576]: CRED_DISP pid=5576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:50.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-139.178.89.65:47014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:50.971390 systemd[1]: sshd@20-139.178.70.100:22-139.178.89.65:47014.service: Deactivated successfully. May 10 01:02:50.971861 systemd[1]: session-23.scope: Deactivated successfully. May 10 01:02:50.972293 systemd-logind[1241]: Session 23 logged out. Waiting for processes to exit. May 10 01:02:50.972799 systemd-logind[1241]: Removed session 23. May 10 01:02:51.674052 systemd[1]: run-containerd-runc-k8s.io-161135e38afd551f0d2d10a74300ddb8ed7a6f98e84f929bf158cdb45164e0d1-runc.XnbQcl.mount: Deactivated successfully. May 10 01:02:54.609523 systemd[1]: run-containerd-runc-k8s.io-161135e38afd551f0d2d10a74300ddb8ed7a6f98e84f929bf158cdb45164e0d1-runc.MT4jcw.mount: Deactivated successfully. May 10 01:02:55.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-139.178.89.65:47020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:55.970024 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 01:02:55.970056 kernel: audit: type=1130 audit(1746838975.964:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-139.178.89.65:47020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:55.965569 systemd[1]: Started sshd@21-139.178.70.100:22-139.178.89.65:47020.service. May 10 01:02:56.032000 audit[5625]: USER_ACCT pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.037759 sshd[5625]: Accepted publickey for core from 139.178.89.65 port 47020 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:02:56.039264 kernel: audit: type=1101 audit(1746838976.032:1533): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.043635 kernel: audit: type=1103 audit(1746838976.038:1534): pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.038000 audit[5625]: CRED_ACQ pid=5625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.040500 sshd[5625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:02:56.052367 kernel: audit: type=1006 audit(1746838976.038:1535): pid=5625 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 01:02:56.052395 kernel: audit: type=1300 audit(1746838976.038:1535): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd72ad75d0 a2=3 a3=0 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:56.053207 kernel: audit: type=1327 audit(1746838976.038:1535): proctitle=737368643A20636F7265205B707269765D May 10 01:02:56.038000 audit[5625]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd72ad75d0 a2=3 a3=0 items=0 ppid=1 pid=5625 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:02:56.038000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:02:56.056281 systemd[1]: Started session-24.scope. May 10 01:02:56.057277 systemd-logind[1241]: New session 24 of user core. May 10 01:02:56.059000 audit[5625]: USER_START pid=5625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.059000 audit[5627]: CRED_ACQ pid=5627 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.067116 kernel: audit: type=1105 audit(1746838976.059:1536): pid=5625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.067165 kernel: audit: type=1103 audit(1746838976.059:1537): pid=5627 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.286591 sshd[5625]: pam_unix(sshd:session): session closed for user core May 10 01:02:56.286000 audit[5625]: USER_END pid=5625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.286000 audit[5625]: CRED_DISP pid=5625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.294113 kernel: audit: type=1106 audit(1746838976.286:1538): pid=5625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.294159 kernel: audit: type=1104 audit(1746838976.286:1539): pid=5625 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:02:56.296735 systemd-logind[1241]: Session 24 logged out. Waiting for processes to exit. May 10 01:02:56.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-139.178.89.65:47020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:02:56.297708 systemd[1]: sshd@21-139.178.70.100:22-139.178.89.65:47020.service: Deactivated successfully. May 10 01:02:56.298171 systemd[1]: session-24.scope: Deactivated successfully. May 10 01:02:56.299189 systemd-logind[1241]: Removed session 24. May 10 01:03:01.287838 systemd[1]: Started sshd@22-139.178.70.100:22-139.178.89.65:56732.service. May 10 01:03:01.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-139.178.89.65:56732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:03:01.289214 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 01:03:01.292911 kernel: audit: type=1130 audit(1746838981.287:1541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-139.178.89.65:56732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:03:01.388000 audit[5641]: USER_ACCT pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.388751 sshd[5641]: Accepted publickey for core from 139.178.89.65 port 56732 ssh2: RSA SHA256:luh87ZM50WMCQ40FBm0Rszj+/w+uuXKA3zlUjaXNvuY May 10 01:03:01.399955 kernel: audit: type=1101 audit(1746838981.388:1542): pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.399997 kernel: audit: type=1103 audit(1746838981.394:1543): pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.400352 kernel: audit: type=1006 audit(1746838981.394:1544): pid=5641 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 01:03:01.394000 audit[5641]: CRED_ACQ pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.401370 kernel: audit: type=1300 audit(1746838981.394:1544): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4676fbe0 a2=3 a3=0 items=0 ppid=1 pid=5641 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:03:01.394000 audit[5641]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4676fbe0 a2=3 a3=0 items=0 ppid=1 pid=5641 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 01:03:01.401730 sshd[5641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 01:03:01.394000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 01:03:01.407165 kernel: audit: type=1327 audit(1746838981.394:1544): proctitle=737368643A20636F7265205B707269765D May 10 01:03:01.411671 systemd[1]: Started session-25.scope. May 10 01:03:01.412472 systemd-logind[1241]: New session 25 of user core. May 10 01:03:01.416000 audit[5641]: USER_START pid=5641 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.420000 audit[5643]: CRED_ACQ pid=5643 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.423790 kernel: audit: type=1105 audit(1746838981.416:1545): pid=5641 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.423832 kernel: audit: type=1103 audit(1746838981.420:1546): pid=5643 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.708631 sshd[5641]: pam_unix(sshd:session): session closed for user core May 10 01:03:01.709000 audit[5641]: USER_END pid=5641 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.713312 kernel: audit: type=1106 audit(1746838981.709:1547): pid=5641 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.713374 systemd[1]: sshd@22-139.178.70.100:22-139.178.89.65:56732.service: Deactivated successfully. May 10 01:03:01.713929 systemd[1]: session-25.scope: Deactivated successfully. May 10 01:03:01.714635 systemd-logind[1241]: Session 25 logged out. Waiting for processes to exit. May 10 01:03:01.715212 systemd-logind[1241]: Removed session 25. May 10 01:03:01.710000 audit[5641]: CRED_DISP pid=5641 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:01.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-139.178.89.65:56732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 01:03:01.719336 kernel: audit: type=1104 audit(1746838981.710:1548): pid=5641 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 01:03:03.204000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:03:03.204000 audit[1941]: AVC avc: denied { watch } for pid=1941 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 01:03:03.204000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a53ce0 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:03:03.204000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 01:03:03.204000 audit[1941]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002852500 a2=fc6 a3=0 items=0 ppid=1798 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c218,c759 key=(null) May 10 01:03:03.204000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269