May 13 00:46:52.652823 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 00:46:52.652837 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:46:52.652843 kernel: Disabled fast string operations May 13 00:46:52.652848 kernel: BIOS-provided physical RAM map: May 13 00:46:52.652852 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable May 13 00:46:52.652858 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved May 13 00:46:52.652864 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved May 13 00:46:52.652868 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable May 13 00:46:52.652872 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data May 13 00:46:52.652876 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS May 13 00:46:52.652880 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable May 13 00:46:52.665270 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved May 13 00:46:52.665281 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved May 13 00:46:52.665286 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 13 00:46:52.665295 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved May 13 00:46:52.665300 kernel: NX (Execute Disable) protection: active May 13 00:46:52.665305 kernel: SMBIOS 2.7 present. May 13 00:46:52.665311 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 May 13 00:46:52.665316 kernel: vmware: hypercall mode: 0x00 May 13 00:46:52.665321 kernel: Hypervisor detected: VMware May 13 00:46:52.665326 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz May 13 00:46:52.665331 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz May 13 00:46:52.665335 kernel: vmware: using clock offset of 4223574485 ns May 13 00:46:52.665342 kernel: tsc: Detected 3408.000 MHz processor May 13 00:46:52.665349 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 00:46:52.665354 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 00:46:52.665359 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 May 13 00:46:52.665364 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 00:46:52.665371 kernel: total RAM covered: 3072M May 13 00:46:52.665380 kernel: Found optimal setting for mtrr clean up May 13 00:46:52.665385 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G May 13 00:46:52.665390 kernel: Using GB pages for direct mapping May 13 00:46:52.665395 kernel: ACPI: Early table checksum verification disabled May 13 00:46:52.665400 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) May 13 00:46:52.665406 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) May 13 00:46:52.665411 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) May 13 00:46:52.665416 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) May 13 00:46:52.665422 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 13 00:46:52.665427 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 13 00:46:52.665433 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) May 13 00:46:52.665440 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) May 13 00:46:52.665445 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) May 13 00:46:52.665453 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) May 13 00:46:52.665459 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) May 13 00:46:52.665466 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) May 13 00:46:52.665474 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] May 13 00:46:52.665482 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] May 13 00:46:52.665488 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 13 00:46:52.665493 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 13 00:46:52.665498 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] May 13 00:46:52.665504 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] May 13 00:46:52.665512 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] May 13 00:46:52.665518 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] May 13 00:46:52.665525 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] May 13 00:46:52.665530 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] May 13 00:46:52.665535 kernel: system APIC only can use physical flat May 13 00:46:52.665542 kernel: Setting APIC routing to physical flat. May 13 00:46:52.665547 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 13 00:46:52.665552 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 13 00:46:52.665557 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 13 00:46:52.665562 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 13 00:46:52.665567 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 13 00:46:52.665575 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 13 00:46:52.665580 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 13 00:46:52.665585 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 13 00:46:52.665591 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 May 13 00:46:52.665599 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 May 13 00:46:52.665607 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 May 13 00:46:52.665614 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 May 13 00:46:52.665620 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 May 13 00:46:52.665624 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 May 13 00:46:52.665631 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 May 13 00:46:52.665638 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 May 13 00:46:52.665643 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 May 13 00:46:52.665648 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 May 13 00:46:52.665654 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 May 13 00:46:52.665660 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 May 13 00:46:52.665669 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 May 13 00:46:52.665676 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 May 13 00:46:52.665682 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 May 13 00:46:52.665689 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 May 13 00:46:52.665694 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 May 13 00:46:52.665702 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 May 13 00:46:52.665709 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 May 13 00:46:52.665717 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 May 13 00:46:52.665724 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 May 13 00:46:52.665729 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 May 13 00:46:52.665735 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 May 13 00:46:52.665741 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 May 13 00:46:52.665746 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 May 13 00:46:52.665751 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 May 13 00:46:52.665758 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 May 13 00:46:52.665764 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 May 13 00:46:52.665772 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 May 13 00:46:52.665778 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 May 13 00:46:52.665784 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 May 13 00:46:52.665789 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 May 13 00:46:52.665794 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 May 13 00:46:52.665799 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 May 13 00:46:52.665804 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 May 13 00:46:52.665811 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 May 13 00:46:52.665818 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 May 13 00:46:52.665826 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 May 13 00:46:52.665832 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 May 13 00:46:52.665837 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 May 13 00:46:52.665843 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 May 13 00:46:52.665848 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 May 13 00:46:52.665853 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 May 13 00:46:52.665858 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 May 13 00:46:52.665863 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 May 13 00:46:52.665869 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 May 13 00:46:52.665875 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 May 13 00:46:52.665880 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 May 13 00:46:52.665886 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 May 13 00:46:52.665892 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 May 13 00:46:52.665897 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 May 13 00:46:52.665902 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 May 13 00:46:52.665908 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 May 13 00:46:52.665918 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 May 13 00:46:52.665923 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 May 13 00:46:52.665929 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 May 13 00:46:52.665935 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 May 13 00:46:52.665943 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 May 13 00:46:52.669082 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 May 13 00:46:52.669093 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 May 13 00:46:52.669099 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 May 13 00:46:52.669105 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 May 13 00:46:52.669113 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 May 13 00:46:52.669119 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 May 13 00:46:52.669127 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 May 13 00:46:52.669133 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 May 13 00:46:52.669141 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 May 13 00:46:52.669146 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 May 13 00:46:52.669152 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 May 13 00:46:52.669159 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 May 13 00:46:52.669165 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 May 13 00:46:52.669171 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 May 13 00:46:52.669178 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 May 13 00:46:52.669186 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 May 13 00:46:52.669197 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 May 13 00:46:52.669204 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 May 13 00:46:52.669211 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 May 13 00:46:52.669219 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 May 13 00:46:52.669225 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 May 13 00:46:52.669233 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 May 13 00:46:52.669242 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 May 13 00:46:52.669251 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 May 13 00:46:52.669256 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 May 13 00:46:52.669261 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 May 13 00:46:52.669270 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 May 13 00:46:52.669275 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 May 13 00:46:52.669282 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 May 13 00:46:52.669290 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 May 13 00:46:52.669296 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 May 13 00:46:52.669302 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 May 13 00:46:52.669310 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 May 13 00:46:52.669316 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 May 13 00:46:52.669321 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 May 13 00:46:52.669326 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 May 13 00:46:52.669335 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 May 13 00:46:52.669344 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 May 13 00:46:52.669353 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 May 13 00:46:52.669361 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 May 13 00:46:52.669370 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 May 13 00:46:52.669379 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 May 13 00:46:52.669387 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 May 13 00:46:52.669394 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 May 13 00:46:52.669399 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 May 13 00:46:52.670722 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 May 13 00:46:52.670733 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 May 13 00:46:52.670739 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 May 13 00:46:52.670745 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 May 13 00:46:52.670752 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 May 13 00:46:52.670757 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 May 13 00:46:52.670763 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 May 13 00:46:52.670771 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 May 13 00:46:52.670777 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 May 13 00:46:52.670782 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 May 13 00:46:52.670789 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 May 13 00:46:52.670798 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 May 13 00:46:52.670806 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 May 13 00:46:52.670815 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 May 13 00:46:52.670824 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 May 13 00:46:52.670833 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 May 13 00:46:52.670839 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 May 13 00:46:52.670844 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 13 00:46:52.670851 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 13 00:46:52.670860 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug May 13 00:46:52.670869 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] May 13 00:46:52.670877 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] May 13 00:46:52.670886 kernel: Zone ranges: May 13 00:46:52.670894 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 00:46:52.670903 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] May 13 00:46:52.670924 kernel: Normal empty May 13 00:46:52.670933 kernel: Movable zone start for each node May 13 00:46:52.670945 kernel: Early memory node ranges May 13 00:46:52.670953 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] May 13 00:46:52.670960 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] May 13 00:46:52.670966 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] May 13 00:46:52.670975 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] May 13 00:46:52.670980 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 00:46:52.670986 kernel: On node 0, zone DMA: 98 pages in unavailable ranges May 13 00:46:52.670997 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges May 13 00:46:52.671006 kernel: ACPI: PM-Timer IO Port: 0x1008 May 13 00:46:52.671012 kernel: system APIC only can use physical flat May 13 00:46:52.671020 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) May 13 00:46:52.671025 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 13 00:46:52.671034 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 13 00:46:52.671042 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 13 00:46:52.671051 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 13 00:46:52.671097 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 13 00:46:52.671103 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 13 00:46:52.671109 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 13 00:46:52.671116 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 13 00:46:52.671122 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 13 00:46:52.671127 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 13 00:46:52.671140 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 13 00:46:52.671146 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 13 00:46:52.671153 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 13 00:46:52.671158 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 13 00:46:52.671163 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 13 00:46:52.671169 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 13 00:46:52.671175 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) May 13 00:46:52.671182 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) May 13 00:46:52.671187 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) May 13 00:46:52.671196 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) May 13 00:46:52.671201 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) May 13 00:46:52.671207 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) May 13 00:46:52.671212 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) May 13 00:46:52.671220 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) May 13 00:46:52.671228 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) May 13 00:46:52.671235 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) May 13 00:46:52.671243 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) May 13 00:46:52.671248 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) May 13 00:46:52.671254 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) May 13 00:46:52.671262 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) May 13 00:46:52.671268 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) May 13 00:46:52.671273 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) May 13 00:46:52.671278 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) May 13 00:46:52.671285 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) May 13 00:46:52.671292 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) May 13 00:46:52.671297 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) May 13 00:46:52.671303 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) May 13 00:46:52.671308 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) May 13 00:46:52.671317 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) May 13 00:46:52.671322 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) May 13 00:46:52.671328 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) May 13 00:46:52.671333 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) May 13 00:46:52.671340 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) May 13 00:46:52.671348 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) May 13 00:46:52.671353 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) May 13 00:46:52.671361 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) May 13 00:46:52.671368 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) May 13 00:46:52.671376 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) May 13 00:46:52.671387 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) May 13 00:46:52.671395 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) May 13 00:46:52.671401 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) May 13 00:46:52.671406 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) May 13 00:46:52.671412 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) May 13 00:46:52.671417 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) May 13 00:46:52.671422 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) May 13 00:46:52.671428 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) May 13 00:46:52.671433 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) May 13 00:46:52.671442 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) May 13 00:46:52.671448 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) May 13 00:46:52.671453 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) May 13 00:46:52.671458 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) May 13 00:46:52.671464 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) May 13 00:46:52.671469 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) May 13 00:46:52.671478 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) May 13 00:46:52.671484 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) May 13 00:46:52.671491 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) May 13 00:46:52.671497 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) May 13 00:46:52.671504 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) May 13 00:46:52.671510 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) May 13 00:46:52.671517 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) May 13 00:46:52.671522 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) May 13 00:46:52.671528 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) May 13 00:46:52.671535 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) May 13 00:46:52.671540 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) May 13 00:46:52.671545 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) May 13 00:46:52.671550 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) May 13 00:46:52.671557 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) May 13 00:46:52.671564 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) May 13 00:46:52.671570 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) May 13 00:46:52.671577 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) May 13 00:46:52.671583 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) May 13 00:46:52.671591 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) May 13 00:46:52.671600 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) May 13 00:46:52.671608 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) May 13 00:46:52.671614 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) May 13 00:46:52.671620 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) May 13 00:46:52.671626 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) May 13 00:46:52.671632 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) May 13 00:46:52.671637 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) May 13 00:46:52.671642 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) May 13 00:46:52.671648 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) May 13 00:46:52.671654 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) May 13 00:46:52.671661 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) May 13 00:46:52.671667 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) May 13 00:46:52.671673 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) May 13 00:46:52.671681 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) May 13 00:46:52.671686 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) May 13 00:46:52.671692 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) May 13 00:46:52.671699 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) May 13 00:46:52.671704 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) May 13 00:46:52.671710 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) May 13 00:46:52.671718 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) May 13 00:46:52.671727 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) May 13 00:46:52.671736 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) May 13 00:46:52.671746 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) May 13 00:46:52.671755 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) May 13 00:46:52.671763 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) May 13 00:46:52.671772 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) May 13 00:46:52.671779 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) May 13 00:46:52.671787 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) May 13 00:46:52.671792 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) May 13 00:46:52.671797 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) May 13 00:46:52.671805 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) May 13 00:46:52.671812 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) May 13 00:46:52.671820 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) May 13 00:46:52.671825 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) May 13 00:46:52.671831 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) May 13 00:46:52.671837 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) May 13 00:46:52.671843 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) May 13 00:46:52.671848 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) May 13 00:46:52.671856 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) May 13 00:46:52.671862 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) May 13 00:46:52.671869 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) May 13 00:46:52.671879 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) May 13 00:46:52.671888 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) May 13 00:46:52.671896 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) May 13 00:46:52.671902 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) May 13 00:46:52.671907 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 May 13 00:46:52.671914 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) May 13 00:46:52.671920 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 00:46:52.671927 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 May 13 00:46:52.671933 kernel: TSC deadline timer available May 13 00:46:52.671940 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs May 13 00:46:52.671947 kernel: [mem 0x80000000-0xefffffff] available for PCI devices May 13 00:46:52.671952 kernel: Booting paravirtualized kernel on VMware hypervisor May 13 00:46:52.671958 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 00:46:52.671965 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 May 13 00:46:52.671971 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 13 00:46:52.671976 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 13 00:46:52.671982 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 May 13 00:46:52.671993 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 May 13 00:46:52.672004 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 May 13 00:46:52.672013 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 May 13 00:46:52.672020 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 May 13 00:46:52.672027 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 May 13 00:46:52.672036 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 May 13 00:46:52.672068 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 May 13 00:46:52.672079 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 May 13 00:46:52.672084 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 May 13 00:46:52.672090 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 May 13 00:46:52.672097 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 May 13 00:46:52.672102 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 May 13 00:46:52.672110 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 May 13 00:46:52.672116 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 May 13 00:46:52.672121 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 May 13 00:46:52.672128 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 May 13 00:46:52.672134 kernel: Policy zone: DMA32 May 13 00:46:52.672142 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:46:52.672150 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 00:46:52.672156 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes May 13 00:46:52.672161 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes May 13 00:46:52.672167 kernel: printk: log_buf_len min size: 262144 bytes May 13 00:46:52.672174 kernel: printk: log_buf_len: 1048576 bytes May 13 00:46:52.672180 kernel: printk: early log buf free: 239728(91%) May 13 00:46:52.672186 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 00:46:52.672193 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 13 00:46:52.672199 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 00:46:52.672207 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 155976K reserved, 0K cma-reserved) May 13 00:46:52.672213 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 May 13 00:46:52.672220 kernel: ftrace: allocating 34584 entries in 136 pages May 13 00:46:52.672226 kernel: ftrace: allocated 136 pages with 2 groups May 13 00:46:52.672233 kernel: rcu: Hierarchical RCU implementation. May 13 00:46:52.672241 kernel: rcu: RCU event tracing is enabled. May 13 00:46:52.672247 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. May 13 00:46:52.672254 kernel: Rude variant of Tasks RCU enabled. May 13 00:46:52.672263 kernel: Tracing variant of Tasks RCU enabled. May 13 00:46:52.672269 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 00:46:52.672274 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 May 13 00:46:52.672280 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 May 13 00:46:52.672286 kernel: random: crng init done May 13 00:46:52.672291 kernel: Console: colour VGA+ 80x25 May 13 00:46:52.672300 kernel: printk: console [tty0] enabled May 13 00:46:52.672307 kernel: printk: console [ttyS0] enabled May 13 00:46:52.672314 kernel: ACPI: Core revision 20210730 May 13 00:46:52.672321 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns May 13 00:46:52.672327 kernel: APIC: Switch to symmetric I/O mode setup May 13 00:46:52.672335 kernel: x2apic enabled May 13 00:46:52.672341 kernel: Switched APIC routing to physical x2apic. May 13 00:46:52.672349 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 00:46:52.672357 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 13 00:46:52.672363 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) May 13 00:46:52.672370 kernel: Disabled fast string operations May 13 00:46:52.672377 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 13 00:46:52.672386 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 13 00:46:52.672396 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 00:46:52.672403 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 13 00:46:52.672411 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 13 00:46:52.672417 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 13 00:46:52.672423 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 13 00:46:52.672430 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 13 00:46:52.672438 kernel: RETBleed: Mitigation: Enhanced IBRS May 13 00:46:52.672444 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 13 00:46:52.672449 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 13 00:46:52.672455 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 13 00:46:52.672463 kernel: SRBDS: Unknown: Dependent on hypervisor status May 13 00:46:52.672468 kernel: GDS: Unknown: Dependent on hypervisor status May 13 00:46:52.672475 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 13 00:46:52.672481 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 13 00:46:52.672488 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 13 00:46:52.672496 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 13 00:46:52.672502 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. May 13 00:46:52.672507 kernel: Freeing SMP alternatives memory: 32K May 13 00:46:52.672513 kernel: pid_max: default: 131072 minimum: 1024 May 13 00:46:52.672521 kernel: LSM: Security Framework initializing May 13 00:46:52.672526 kernel: SELinux: Initializing. May 13 00:46:52.672533 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 13 00:46:52.672539 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 13 00:46:52.672546 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 13 00:46:52.672552 kernel: Performance Events: Skylake events, core PMU driver. May 13 00:46:52.672560 kernel: core: CPUID marked event: 'cpu cycles' unavailable May 13 00:46:52.672566 kernel: core: CPUID marked event: 'instructions' unavailable May 13 00:46:52.672571 kernel: core: CPUID marked event: 'bus cycles' unavailable May 13 00:46:52.672577 kernel: core: CPUID marked event: 'cache references' unavailable May 13 00:46:52.672583 kernel: core: CPUID marked event: 'cache misses' unavailable May 13 00:46:52.672588 kernel: core: CPUID marked event: 'branch instructions' unavailable May 13 00:46:52.672594 kernel: core: CPUID marked event: 'branch misses' unavailable May 13 00:46:52.672601 kernel: ... version: 1 May 13 00:46:52.672609 kernel: ... bit width: 48 May 13 00:46:52.672615 kernel: ... generic registers: 4 May 13 00:46:52.672621 kernel: ... value mask: 0000ffffffffffff May 13 00:46:52.672627 kernel: ... max period: 000000007fffffff May 13 00:46:52.672634 kernel: ... fixed-purpose events: 0 May 13 00:46:52.672643 kernel: ... event mask: 000000000000000f May 13 00:46:52.672650 kernel: signal: max sigframe size: 1776 May 13 00:46:52.672656 kernel: rcu: Hierarchical SRCU implementation. May 13 00:46:52.672663 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 13 00:46:52.672668 kernel: smp: Bringing up secondary CPUs ... May 13 00:46:52.672674 kernel: x86: Booting SMP configuration: May 13 00:46:52.672680 kernel: .... node #0, CPUs: #1 May 13 00:46:52.672687 kernel: Disabled fast string operations May 13 00:46:52.672700 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 May 13 00:46:52.672706 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 13 00:46:52.672712 kernel: smp: Brought up 1 node, 2 CPUs May 13 00:46:52.672720 kernel: smpboot: Max logical packages: 128 May 13 00:46:52.672727 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) May 13 00:46:52.672737 kernel: devtmpfs: initialized May 13 00:46:52.672743 kernel: x86/mm: Memory block size: 128MB May 13 00:46:52.672751 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) May 13 00:46:52.672757 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 00:46:52.672763 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) May 13 00:46:52.672771 kernel: pinctrl core: initialized pinctrl subsystem May 13 00:46:52.672778 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 00:46:52.672785 kernel: audit: initializing netlink subsys (disabled) May 13 00:46:52.672792 kernel: audit: type=2000 audit(1747097211.056:1): state=initialized audit_enabled=0 res=1 May 13 00:46:52.672799 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 00:46:52.672805 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 00:46:52.672811 kernel: cpuidle: using governor menu May 13 00:46:52.672816 kernel: Simple Boot Flag at 0x36 set to 0x80 May 13 00:46:52.672822 kernel: ACPI: bus type PCI registered May 13 00:46:52.672829 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 00:46:52.672835 kernel: dca service started, version 1.12.1 May 13 00:46:52.672841 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) May 13 00:46:52.672847 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 May 13 00:46:52.672855 kernel: PCI: Using configuration type 1 for base access May 13 00:46:52.672866 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 00:46:52.672872 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 13 00:46:52.672881 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 00:46:52.672887 kernel: ACPI: Added _OSI(Module Device) May 13 00:46:52.672893 kernel: ACPI: Added _OSI(Processor Device) May 13 00:46:52.672900 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 00:46:52.672906 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 00:46:52.672911 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 00:46:52.672918 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 00:46:52.672924 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 00:46:52.672930 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 00:46:52.672936 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 13 00:46:52.672941 kernel: ACPI: Interpreter enabled May 13 00:46:52.672947 kernel: ACPI: PM: (supports S0 S1 S5) May 13 00:46:52.672953 kernel: ACPI: Using IOAPIC for interrupt routing May 13 00:46:52.672958 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 00:46:52.672964 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F May 13 00:46:52.672971 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) May 13 00:46:52.673090 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 13 00:46:52.673162 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] May 13 00:46:52.673224 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] May 13 00:46:52.673236 kernel: PCI host bridge to bus 0000:00 May 13 00:46:52.673290 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 00:46:52.673352 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] May 13 00:46:52.673400 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 00:46:52.673447 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 00:46:52.673496 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] May 13 00:46:52.673544 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] May 13 00:46:52.673610 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 May 13 00:46:52.673681 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 May 13 00:46:52.673751 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 May 13 00:46:52.673811 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a May 13 00:46:52.673865 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] May 13 00:46:52.673926 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 13 00:46:52.673981 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 13 00:46:52.674042 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 13 00:46:52.674124 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 13 00:46:52.674192 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 May 13 00:46:52.674250 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI May 13 00:46:52.674314 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB May 13 00:46:52.674383 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 May 13 00:46:52.674440 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] May 13 00:46:52.674496 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] May 13 00:46:52.674553 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 May 13 00:46:52.674604 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] May 13 00:46:52.674650 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] May 13 00:46:52.674701 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] May 13 00:46:52.674746 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] May 13 00:46:52.674792 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 00:46:52.674858 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 May 13 00:46:52.674919 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.674973 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold May 13 00:46:52.675038 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.675107 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold May 13 00:46:52.675159 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.675210 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold May 13 00:46:52.675488 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.675539 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold May 13 00:46:52.675595 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.675642 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold May 13 00:46:52.675691 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.675740 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold May 13 00:46:52.675808 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.675864 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold May 13 00:46:52.675928 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.675989 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold May 13 00:46:52.676065 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.676128 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold May 13 00:46:52.676188 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.676243 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold May 13 00:46:52.676304 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.676372 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold May 13 00:46:52.676444 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.676503 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold May 13 00:46:52.676565 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.676620 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold May 13 00:46:52.676670 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.676716 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold May 13 00:46:52.676767 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.676816 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold May 13 00:46:52.676866 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.676911 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold May 13 00:46:52.676965 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677013 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold May 13 00:46:52.677081 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677142 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold May 13 00:46:52.677211 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677266 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold May 13 00:46:52.677323 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677375 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold May 13 00:46:52.677432 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677490 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold May 13 00:46:52.677554 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677608 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold May 13 00:46:52.677667 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677716 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold May 13 00:46:52.677766 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677811 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold May 13 00:46:52.677865 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.677911 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold May 13 00:46:52.677961 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.678011 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold May 13 00:46:52.678102 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.678156 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold May 13 00:46:52.678218 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.678269 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold May 13 00:46:52.678336 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.678390 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold May 13 00:46:52.678449 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.678496 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold May 13 00:46:52.678545 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.678594 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold May 13 00:46:52.678643 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 May 13 00:46:52.678689 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold May 13 00:46:52.678738 kernel: pci_bus 0000:01: extended config space not accessible May 13 00:46:52.678786 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 13 00:46:52.678833 kernel: pci_bus 0000:02: extended config space not accessible May 13 00:46:52.678843 kernel: acpiphp: Slot [32] registered May 13 00:46:52.678849 kernel: acpiphp: Slot [33] registered May 13 00:46:52.678855 kernel: acpiphp: Slot [34] registered May 13 00:46:52.678861 kernel: acpiphp: Slot [35] registered May 13 00:46:52.678867 kernel: acpiphp: Slot [36] registered May 13 00:46:52.678872 kernel: acpiphp: Slot [37] registered May 13 00:46:52.678878 kernel: acpiphp: Slot [38] registered May 13 00:46:52.678884 kernel: acpiphp: Slot [39] registered May 13 00:46:52.678889 kernel: acpiphp: Slot [40] registered May 13 00:46:52.678896 kernel: acpiphp: Slot [41] registered May 13 00:46:52.678902 kernel: acpiphp: Slot [42] registered May 13 00:46:52.678908 kernel: acpiphp: Slot [43] registered May 13 00:46:52.678914 kernel: acpiphp: Slot [44] registered May 13 00:46:52.678920 kernel: acpiphp: Slot [45] registered May 13 00:46:52.678926 kernel: acpiphp: Slot [46] registered May 13 00:46:52.678931 kernel: acpiphp: Slot [47] registered May 13 00:46:52.678937 kernel: acpiphp: Slot [48] registered May 13 00:46:52.678943 kernel: acpiphp: Slot [49] registered May 13 00:46:52.678948 kernel: acpiphp: Slot [50] registered May 13 00:46:52.678956 kernel: acpiphp: Slot [51] registered May 13 00:46:52.678961 kernel: acpiphp: Slot [52] registered May 13 00:46:52.678967 kernel: acpiphp: Slot [53] registered May 13 00:46:52.678973 kernel: acpiphp: Slot [54] registered May 13 00:46:52.678978 kernel: acpiphp: Slot [55] registered May 13 00:46:52.678984 kernel: acpiphp: Slot [56] registered May 13 00:46:52.678990 kernel: acpiphp: Slot [57] registered May 13 00:46:52.678995 kernel: acpiphp: Slot [58] registered May 13 00:46:52.679001 kernel: acpiphp: Slot [59] registered May 13 00:46:52.679008 kernel: acpiphp: Slot [60] registered May 13 00:46:52.679014 kernel: acpiphp: Slot [61] registered May 13 00:46:52.679019 kernel: acpiphp: Slot [62] registered May 13 00:46:52.679025 kernel: acpiphp: Slot [63] registered May 13 00:46:52.679092 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) May 13 00:46:52.679140 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 13 00:46:52.679187 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 13 00:46:52.679232 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 13 00:46:52.679278 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) May 13 00:46:52.679327 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) May 13 00:46:52.679373 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) May 13 00:46:52.679418 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) May 13 00:46:52.679463 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) May 13 00:46:52.679516 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 May 13 00:46:52.679564 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] May 13 00:46:52.679613 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] May 13 00:46:52.679663 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 13 00:46:52.679709 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold May 13 00:46:52.679756 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 13 00:46:52.679803 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 13 00:46:52.679848 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 13 00:46:52.679894 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 13 00:46:52.679939 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 13 00:46:52.679987 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 13 00:46:52.680033 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 13 00:46:52.680143 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 13 00:46:52.680192 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 13 00:46:52.680237 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 13 00:46:52.680283 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 13 00:46:52.680328 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 13 00:46:52.680373 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 13 00:46:52.680421 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 13 00:46:52.680467 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 13 00:46:52.680512 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 13 00:46:52.680557 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 13 00:46:52.680603 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 13 00:46:52.680651 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 13 00:46:52.680696 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 13 00:46:52.680741 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 13 00:46:52.680786 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 13 00:46:52.680830 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 13 00:46:52.680875 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 13 00:46:52.680920 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 13 00:46:52.680968 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 13 00:46:52.681020 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 13 00:46:52.681094 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 May 13 00:46:52.681146 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] May 13 00:46:52.681194 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] May 13 00:46:52.681241 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] May 13 00:46:52.681288 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] May 13 00:46:52.681363 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 13 00:46:52.681646 kernel: pci 0000:0b:00.0: supports D1 D2 May 13 00:46:52.681722 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 13 00:46:52.682069 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 13 00:46:52.682125 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 13 00:46:52.682174 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 13 00:46:52.682243 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 13 00:46:52.682532 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 13 00:46:52.682614 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 13 00:46:52.682666 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 13 00:46:52.682714 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 13 00:46:52.682761 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 13 00:46:52.682808 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 13 00:46:52.682854 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 13 00:46:52.682901 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 13 00:46:52.682948 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 13 00:46:52.682998 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 13 00:46:52.683044 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 13 00:46:52.690126 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 13 00:46:52.690181 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 13 00:46:52.690231 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 13 00:46:52.690278 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 13 00:46:52.690326 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 13 00:46:52.690372 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 13 00:46:52.690423 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 13 00:46:52.690470 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 13 00:46:52.690515 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 13 00:46:52.690562 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 13 00:46:52.690607 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 13 00:46:52.690653 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 13 00:46:52.690699 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 13 00:46:52.690745 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 13 00:46:52.690793 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 13 00:46:52.690838 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 13 00:46:52.690884 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 13 00:46:52.690930 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 13 00:46:52.690975 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 13 00:46:52.691025 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 13 00:46:52.692240 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 13 00:46:52.692297 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 13 00:46:52.692346 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 13 00:46:52.692393 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 13 00:46:52.692441 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 13 00:46:52.692487 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 13 00:46:52.692534 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 13 00:46:52.692580 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 13 00:46:52.692626 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 13 00:46:52.692675 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 13 00:46:52.692722 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 13 00:46:52.692768 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 13 00:46:52.692815 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 13 00:46:52.692861 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 13 00:46:52.692907 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 13 00:46:52.692954 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 13 00:46:52.693006 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 13 00:46:52.694732 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 13 00:46:52.694792 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 13 00:46:52.694843 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 13 00:46:52.694890 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 13 00:46:52.694937 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 13 00:46:52.694983 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 13 00:46:52.695029 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 13 00:46:52.695096 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 13 00:46:52.695148 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 13 00:46:52.695195 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 13 00:46:52.695242 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 13 00:46:52.695287 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 13 00:46:52.695332 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 13 00:46:52.695379 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 13 00:46:52.695424 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 13 00:46:52.695473 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 13 00:46:52.695519 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 13 00:46:52.695565 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 13 00:46:52.695612 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 13 00:46:52.695659 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 13 00:46:52.695706 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 13 00:46:52.695752 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 13 00:46:52.695798 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 13 00:46:52.695844 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 13 00:46:52.695893 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 13 00:46:52.695940 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 13 00:46:52.695986 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 13 00:46:52.696037 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 13 00:46:52.696045 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 May 13 00:46:52.696051 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 May 13 00:46:52.697079 kernel: ACPI: PCI: Interrupt link LNKB disabled May 13 00:46:52.697086 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 00:46:52.697094 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 May 13 00:46:52.697100 kernel: iommu: Default domain type: Translated May 13 00:46:52.697106 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 00:46:52.697166 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device May 13 00:46:52.697217 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 00:46:52.697265 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible May 13 00:46:52.697274 kernel: vgaarb: loaded May 13 00:46:52.697280 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 00:46:52.697286 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 00:46:52.697294 kernel: PTP clock support registered May 13 00:46:52.697299 kernel: PCI: Using ACPI for IRQ routing May 13 00:46:52.697305 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 00:46:52.697312 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] May 13 00:46:52.697317 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] May 13 00:46:52.697323 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 May 13 00:46:52.697329 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter May 13 00:46:52.697334 kernel: clocksource: Switched to clocksource tsc-early May 13 00:46:52.697340 kernel: VFS: Disk quotas dquot_6.6.0 May 13 00:46:52.697347 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 00:46:52.697353 kernel: pnp: PnP ACPI init May 13 00:46:52.697406 kernel: system 00:00: [io 0x1000-0x103f] has been reserved May 13 00:46:52.697450 kernel: system 00:00: [io 0x1040-0x104f] has been reserved May 13 00:46:52.697491 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved May 13 00:46:52.697537 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved May 13 00:46:52.697582 kernel: pnp 00:06: [dma 2] May 13 00:46:52.697629 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved May 13 00:46:52.697671 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved May 13 00:46:52.697712 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved May 13 00:46:52.697720 kernel: pnp: PnP ACPI: found 8 devices May 13 00:46:52.697726 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 00:46:52.697732 kernel: NET: Registered PF_INET protocol family May 13 00:46:52.697739 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 00:46:52.697746 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 13 00:46:52.697752 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 00:46:52.697758 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 13 00:46:52.697764 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 13 00:46:52.697770 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 13 00:46:52.697775 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 13 00:46:52.697781 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 13 00:46:52.697787 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 00:46:52.697793 kernel: NET: Registered PF_XDP protocol family May 13 00:46:52.697841 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 May 13 00:46:52.697889 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 13 00:46:52.697936 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 13 00:46:52.697984 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 13 00:46:52.698031 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 13 00:46:52.699113 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 May 13 00:46:52.699172 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 May 13 00:46:52.699223 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 May 13 00:46:52.699272 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 May 13 00:46:52.699320 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 May 13 00:46:52.699368 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 May 13 00:46:52.699415 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 May 13 00:46:52.699465 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 May 13 00:46:52.699511 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 May 13 00:46:52.699557 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 May 13 00:46:52.699605 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 May 13 00:46:52.699652 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 May 13 00:46:52.699699 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 May 13 00:46:52.699748 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 May 13 00:46:52.699795 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 May 13 00:46:52.699841 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 May 13 00:46:52.699888 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 May 13 00:46:52.699934 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 May 13 00:46:52.699980 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] May 13 00:46:52.700034 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] May 13 00:46:52.701142 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701197 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701246 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701294 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701339 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701386 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701435 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701481 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701527 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701573 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701619 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701665 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701712 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701758 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701805 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701851 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701896 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 13 00:46:52.701941 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.701992 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 13 00:46:52.702042 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.702874 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 13 00:46:52.702926 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.702975 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703025 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703096 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703143 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703189 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703235 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703279 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703325 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703371 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703419 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703465 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703510 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703555 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703601 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703646 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703691 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703736 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703784 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703829 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703874 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.703919 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 13 00:46:52.703965 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.704010 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705079 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705145 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705196 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705247 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705294 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705340 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705386 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705432 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705479 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705525 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705571 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705617 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705667 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705711 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705758 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705804 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705851 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705896 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 13 00:46:52.705942 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.705987 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 13 00:46:52.706034 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707133 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707189 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707238 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707287 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707335 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707381 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707428 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707475 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707522 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707569 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707618 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707664 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707710 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707757 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707803 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707850 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707896 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 13 00:46:52.707943 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 13 00:46:52.707998 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 13 00:46:52.709076 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] May 13 00:46:52.709142 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 13 00:46:52.709192 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 13 00:46:52.709240 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 13 00:46:52.709291 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] May 13 00:46:52.709339 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 13 00:46:52.709386 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 13 00:46:52.709432 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 13 00:46:52.709478 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] May 13 00:46:52.709528 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 13 00:46:52.709574 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 13 00:46:52.709620 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 13 00:46:52.709666 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 13 00:46:52.709713 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 13 00:46:52.709759 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 13 00:46:52.709804 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 13 00:46:52.709850 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 13 00:46:52.709896 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 13 00:46:52.709945 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 13 00:46:52.709991 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 13 00:46:52.710037 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 13 00:46:52.710096 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 13 00:46:52.710144 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 13 00:46:52.710192 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 13 00:46:52.710241 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 13 00:46:52.710287 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 13 00:46:52.710333 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 13 00:46:52.710378 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 13 00:46:52.710425 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 13 00:46:52.710470 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 13 00:46:52.710515 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 13 00:46:52.710562 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 13 00:46:52.710610 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] May 13 00:46:52.710658 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 13 00:46:52.710704 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 13 00:46:52.710750 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 13 00:46:52.710796 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] May 13 00:46:52.710842 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 13 00:46:52.710887 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 13 00:46:52.710932 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 13 00:46:52.710978 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 13 00:46:52.711031 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 13 00:46:52.713132 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 13 00:46:52.713187 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 13 00:46:52.713237 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 13 00:46:52.713284 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 13 00:46:52.713331 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 13 00:46:52.713377 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 13 00:46:52.713422 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 13 00:46:52.713468 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 13 00:46:52.713514 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 13 00:46:52.713559 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 13 00:46:52.713608 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 13 00:46:52.713653 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 13 00:46:52.713699 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 13 00:46:52.713744 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 13 00:46:52.713789 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 13 00:46:52.713834 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 13 00:46:52.713880 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 13 00:46:52.713925 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 13 00:46:52.713971 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 13 00:46:52.714024 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 13 00:46:52.718793 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 13 00:46:52.718849 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 13 00:46:52.718899 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 13 00:46:52.718947 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 13 00:46:52.718993 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 13 00:46:52.719040 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 13 00:46:52.719112 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 13 00:46:52.719159 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 13 00:46:52.719205 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 13 00:46:52.719255 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 13 00:46:52.719301 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 13 00:46:52.719348 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 13 00:46:52.719394 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 13 00:46:52.719440 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 13 00:46:52.719486 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 13 00:46:52.719531 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 13 00:46:52.719577 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 13 00:46:52.719622 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 13 00:46:52.719671 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 13 00:46:52.719717 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 13 00:46:52.719763 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 13 00:46:52.719808 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 13 00:46:52.719855 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 13 00:46:52.719901 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 13 00:46:52.719948 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 13 00:46:52.719997 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 13 00:46:52.720045 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 13 00:46:52.720098 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 13 00:46:52.720147 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 13 00:46:52.720193 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 13 00:46:52.720238 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 13 00:46:52.720284 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 13 00:46:52.720330 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 13 00:46:52.720377 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 13 00:46:52.720422 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 13 00:46:52.720467 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 13 00:46:52.720513 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 13 00:46:52.720561 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 13 00:46:52.720606 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 13 00:46:52.720652 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 13 00:46:52.720697 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 13 00:46:52.720743 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 13 00:46:52.720788 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 13 00:46:52.720833 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 13 00:46:52.720879 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 13 00:46:52.720924 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 13 00:46:52.720969 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 13 00:46:52.721021 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 13 00:46:52.721081 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 13 00:46:52.721128 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 13 00:46:52.721174 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 13 00:46:52.721219 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] May 13 00:46:52.721261 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] May 13 00:46:52.721302 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] May 13 00:46:52.721343 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] May 13 00:46:52.721386 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] May 13 00:46:52.721430 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] May 13 00:46:52.721473 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] May 13 00:46:52.721515 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] May 13 00:46:52.721557 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] May 13 00:46:52.721599 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] May 13 00:46:52.721641 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] May 13 00:46:52.721686 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] May 13 00:46:52.721728 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] May 13 00:46:52.721775 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] May 13 00:46:52.721818 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] May 13 00:46:52.721860 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] May 13 00:46:52.721906 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] May 13 00:46:52.721949 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] May 13 00:46:52.721999 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] May 13 00:46:52.722048 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] May 13 00:46:52.722106 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] May 13 00:46:52.722150 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] May 13 00:46:52.722197 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] May 13 00:46:52.722241 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] May 13 00:46:52.722287 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] May 13 00:46:52.722333 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] May 13 00:46:52.722380 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] May 13 00:46:52.722423 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] May 13 00:46:52.722469 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] May 13 00:46:52.722512 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] May 13 00:46:52.722559 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] May 13 00:46:52.722605 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] May 13 00:46:52.722653 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] May 13 00:46:52.722696 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] May 13 00:46:52.722739 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] May 13 00:46:52.722785 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] May 13 00:46:52.722828 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] May 13 00:46:52.722874 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] May 13 00:46:52.722929 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] May 13 00:46:52.722975 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] May 13 00:46:52.723028 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] May 13 00:46:52.725048 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] May 13 00:46:52.725121 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] May 13 00:46:52.725172 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] May 13 00:46:52.725220 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] May 13 00:46:52.725268 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] May 13 00:46:52.725313 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] May 13 00:46:52.725359 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] May 13 00:46:52.725402 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] May 13 00:46:52.725449 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] May 13 00:46:52.725495 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] May 13 00:46:52.725541 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] May 13 00:46:52.725584 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] May 13 00:46:52.725627 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] May 13 00:46:52.725673 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] May 13 00:46:52.725719 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] May 13 00:46:52.725763 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] May 13 00:46:52.725810 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] May 13 00:46:52.725853 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] May 13 00:46:52.725896 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] May 13 00:46:52.725945 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] May 13 00:46:52.725989 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] May 13 00:46:52.726039 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] May 13 00:46:52.729113 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] May 13 00:46:52.729168 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] May 13 00:46:52.729215 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] May 13 00:46:52.729262 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] May 13 00:46:52.729306 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] May 13 00:46:52.729352 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] May 13 00:46:52.729399 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] May 13 00:46:52.729445 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] May 13 00:46:52.729488 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] May 13 00:46:52.729531 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] May 13 00:46:52.729579 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] May 13 00:46:52.729622 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] May 13 00:46:52.729664 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] May 13 00:46:52.729712 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] May 13 00:46:52.729756 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] May 13 00:46:52.729804 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] May 13 00:46:52.729847 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] May 13 00:46:52.729894 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] May 13 00:46:52.729940 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] May 13 00:46:52.729985 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] May 13 00:46:52.730033 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] May 13 00:46:52.730112 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] May 13 00:46:52.730158 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] May 13 00:46:52.730207 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] May 13 00:46:52.730251 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] May 13 00:46:52.730305 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 13 00:46:52.730314 kernel: PCI: CLS 32 bytes, default 64 May 13 00:46:52.730321 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 13 00:46:52.730327 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 13 00:46:52.730333 kernel: clocksource: Switched to clocksource tsc May 13 00:46:52.730340 kernel: Initialise system trusted keyrings May 13 00:46:52.730346 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 13 00:46:52.730352 kernel: Key type asymmetric registered May 13 00:46:52.730360 kernel: Asymmetric key parser 'x509' registered May 13 00:46:52.730366 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 00:46:52.730372 kernel: io scheduler mq-deadline registered May 13 00:46:52.730378 kernel: io scheduler kyber registered May 13 00:46:52.730384 kernel: io scheduler bfq registered May 13 00:46:52.730433 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 May 13 00:46:52.730481 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.730529 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 May 13 00:46:52.730576 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.730625 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 May 13 00:46:52.730672 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.730719 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 May 13 00:46:52.730766 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.730813 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 May 13 00:46:52.730859 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.730908 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 May 13 00:46:52.730954 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731001 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 May 13 00:46:52.731047 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731108 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 May 13 00:46:52.731158 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731205 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 May 13 00:46:52.731251 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731297 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 May 13 00:46:52.731344 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731388 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 May 13 00:46:52.731435 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731483 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 May 13 00:46:52.731530 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731576 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 May 13 00:46:52.731622 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731668 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 May 13 00:46:52.731717 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731762 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 May 13 00:46:52.731809 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731855 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 May 13 00:46:52.731902 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.731952 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 May 13 00:46:52.732007 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.735696 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 May 13 00:46:52.735787 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.735839 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 May 13 00:46:52.735886 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.735933 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 May 13 00:46:52.735984 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736030 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 May 13 00:46:52.736088 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736135 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 May 13 00:46:52.736180 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736226 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 May 13 00:46:52.736275 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736319 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 May 13 00:46:52.736365 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736409 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 May 13 00:46:52.736454 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736500 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 May 13 00:46:52.736548 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736593 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 May 13 00:46:52.736639 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736684 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 May 13 00:46:52.736729 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736776 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 May 13 00:46:52.736822 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736867 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 May 13 00:46:52.736912 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.736957 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 May 13 00:46:52.737003 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.737051 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 May 13 00:46:52.737109 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 13 00:46:52.737118 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 00:46:52.737125 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 00:46:52.737131 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 00:46:52.737137 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 May 13 00:46:52.737145 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 00:46:52.737151 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 00:46:52.737200 kernel: rtc_cmos 00:01: registered as rtc0 May 13 00:46:52.737210 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 00:46:52.737252 kernel: rtc_cmos 00:01: setting system clock to 2025-05-13T00:46:52 UTC (1747097212) May 13 00:46:52.737293 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram May 13 00:46:52.737302 kernel: intel_pstate: CPU model not supported May 13 00:46:52.737308 kernel: NET: Registered PF_INET6 protocol family May 13 00:46:52.737316 kernel: Segment Routing with IPv6 May 13 00:46:52.737323 kernel: In-situ OAM (IOAM) with IPv6 May 13 00:46:52.737329 kernel: NET: Registered PF_PACKET protocol family May 13 00:46:52.737335 kernel: Key type dns_resolver registered May 13 00:46:52.737341 kernel: IPI shorthand broadcast: enabled May 13 00:46:52.737347 kernel: sched_clock: Marking stable (840068338, 228456370)->(1136659754, -68135046) May 13 00:46:52.737353 kernel: registered taskstats version 1 May 13 00:46:52.737359 kernel: Loading compiled-in X.509 certificates May 13 00:46:52.737365 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 00:46:52.737371 kernel: Key type .fscrypt registered May 13 00:46:52.737378 kernel: Key type fscrypt-provisioning registered May 13 00:46:52.737384 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 00:46:52.737390 kernel: ima: Allocated hash algorithm: sha1 May 13 00:46:52.737396 kernel: ima: No architecture policies found May 13 00:46:52.737402 kernel: clk: Disabling unused clocks May 13 00:46:52.737408 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 00:46:52.737414 kernel: Write protecting the kernel read-only data: 28672k May 13 00:46:52.737420 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 00:46:52.737427 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 00:46:52.737433 kernel: Run /init as init process May 13 00:46:52.737439 kernel: with arguments: May 13 00:46:52.737445 kernel: /init May 13 00:46:52.737451 kernel: with environment: May 13 00:46:52.737456 kernel: HOME=/ May 13 00:46:52.737462 kernel: TERM=linux May 13 00:46:52.737468 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 00:46:52.737475 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:46:52.737484 systemd[1]: Detected virtualization vmware. May 13 00:46:52.737491 systemd[1]: Detected architecture x86-64. May 13 00:46:52.737497 systemd[1]: Running in initrd. May 13 00:46:52.737503 systemd[1]: No hostname configured, using default hostname. May 13 00:46:52.737509 systemd[1]: Hostname set to . May 13 00:46:52.737515 systemd[1]: Initializing machine ID from random generator. May 13 00:46:52.737521 systemd[1]: Queued start job for default target initrd.target. May 13 00:46:52.737527 systemd[1]: Started systemd-ask-password-console.path. May 13 00:46:52.737534 systemd[1]: Reached target cryptsetup.target. May 13 00:46:52.737541 systemd[1]: Reached target paths.target. May 13 00:46:52.737547 systemd[1]: Reached target slices.target. May 13 00:46:52.737552 systemd[1]: Reached target swap.target. May 13 00:46:52.737558 systemd[1]: Reached target timers.target. May 13 00:46:52.737565 systemd[1]: Listening on iscsid.socket. May 13 00:46:52.737571 systemd[1]: Listening on iscsiuio.socket. May 13 00:46:52.737578 systemd[1]: Listening on systemd-journald-audit.socket. May 13 00:46:52.737584 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 00:46:52.737591 systemd[1]: Listening on systemd-journald.socket. May 13 00:46:52.737597 systemd[1]: Listening on systemd-networkd.socket. May 13 00:46:52.737603 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:46:52.737609 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:46:52.737615 systemd[1]: Reached target sockets.target. May 13 00:46:52.737622 systemd[1]: Starting kmod-static-nodes.service... May 13 00:46:52.737628 systemd[1]: Finished network-cleanup.service. May 13 00:46:52.737635 systemd[1]: Starting systemd-fsck-usr.service... May 13 00:46:52.737641 systemd[1]: Starting systemd-journald.service... May 13 00:46:52.737648 systemd[1]: Starting systemd-modules-load.service... May 13 00:46:52.737654 systemd[1]: Starting systemd-resolved.service... May 13 00:46:52.737660 systemd[1]: Starting systemd-vconsole-setup.service... May 13 00:46:52.737666 systemd[1]: Finished kmod-static-nodes.service. May 13 00:46:52.737672 systemd[1]: Finished systemd-fsck-usr.service. May 13 00:46:52.737679 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:46:52.737685 systemd[1]: Finished systemd-vconsole-setup.service. May 13 00:46:52.737692 kernel: audit: type=1130 audit(1747097212.651:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.737698 systemd[1]: Starting dracut-cmdline-ask.service... May 13 00:46:52.737705 systemd[1]: Started systemd-resolved.service. May 13 00:46:52.737711 kernel: audit: type=1130 audit(1747097212.658:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.737717 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:46:52.737724 kernel: audit: type=1130 audit(1747097212.661:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.737730 systemd[1]: Reached target nss-lookup.target. May 13 00:46:52.737736 systemd[1]: Finished dracut-cmdline-ask.service. May 13 00:46:52.737743 systemd[1]: Starting dracut-cmdline.service... May 13 00:46:52.737750 kernel: audit: type=1130 audit(1747097212.682:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.737756 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 00:46:52.737762 kernel: Bridge firewalling registered May 13 00:46:52.737769 kernel: SCSI subsystem initialized May 13 00:46:52.737774 kernel: Loading iSCSI transport class v2.0-870. May 13 00:46:52.737781 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 00:46:52.737787 kernel: device-mapper: uevent: version 1.0.3 May 13 00:46:52.737793 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 00:46:52.737802 systemd-journald[216]: Journal started May 13 00:46:52.737833 systemd-journald[216]: Runtime Journal (/run/log/journal/57e38950fcaa4ed98b7001b43e78123a) is 4.8M, max 38.8M, 34.0M free. May 13 00:46:52.741811 systemd[1]: Started systemd-journald.service. May 13 00:46:52.741833 kernel: audit: type=1130 audit(1747097212.738:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.651430 systemd-resolved[218]: Positive Trust Anchors: May 13 00:46:52.651434 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:46:52.748778 kernel: audit: type=1130 audit(1747097212.741:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.651454 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:46:52.657647 systemd-resolved[218]: Defaulting to hostname 'linux'. May 13 00:46:52.667783 systemd-modules-load[217]: Inserted module 'overlay' May 13 00:46:52.704075 systemd-modules-load[217]: Inserted module 'br_netfilter' May 13 00:46:52.741941 systemd-modules-load[217]: Inserted module 'dm_multipath' May 13 00:46:52.750041 dracut-cmdline[233]: dracut-dracut-053 May 13 00:46:52.750041 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 13 00:46:52.750041 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 00:46:52.742514 systemd[1]: Finished systemd-modules-load.service. May 13 00:46:52.742961 systemd[1]: Starting systemd-sysctl.service... May 13 00:46:52.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.751805 systemd[1]: Finished systemd-sysctl.service. May 13 00:46:52.755113 kernel: audit: type=1130 audit(1747097212.750:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.755130 kernel: iscsi: registered transport (tcp) May 13 00:46:52.771142 kernel: iscsi: registered transport (qla4xxx) May 13 00:46:52.771166 kernel: QLogic iSCSI HBA Driver May 13 00:46:52.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.787549 systemd[1]: Finished dracut-cmdline.service. May 13 00:46:52.788177 systemd[1]: Starting dracut-pre-udev.service... May 13 00:46:52.791082 kernel: audit: type=1130 audit(1747097212.786:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:52.826074 kernel: raid6: avx2x4 gen() 42708 MB/s May 13 00:46:52.843093 kernel: raid6: avx2x4 xor() 21802 MB/s May 13 00:46:52.860091 kernel: raid6: avx2x2 gen() 53276 MB/s May 13 00:46:52.877099 kernel: raid6: avx2x2 xor() 32082 MB/s May 13 00:46:52.894074 kernel: raid6: avx2x1 gen() 44774 MB/s May 13 00:46:52.911068 kernel: raid6: avx2x1 xor() 26610 MB/s May 13 00:46:52.928081 kernel: raid6: sse2x4 gen() 20166 MB/s May 13 00:46:52.945068 kernel: raid6: sse2x4 xor() 11329 MB/s May 13 00:46:52.962068 kernel: raid6: sse2x2 gen() 20939 MB/s May 13 00:46:52.979096 kernel: raid6: sse2x2 xor() 13406 MB/s May 13 00:46:52.996095 kernel: raid6: sse2x1 gen() 18518 MB/s May 13 00:46:53.013246 kernel: raid6: sse2x1 xor() 9126 MB/s May 13 00:46:53.013262 kernel: raid6: using algorithm avx2x2 gen() 53276 MB/s May 13 00:46:53.013271 kernel: raid6: .... xor() 32082 MB/s, rmw enabled May 13 00:46:53.014446 kernel: raid6: using avx2x2 recovery algorithm May 13 00:46:53.023066 kernel: xor: automatically using best checksumming function avx May 13 00:46:53.085075 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 00:46:53.089391 systemd[1]: Finished dracut-pre-udev.service. May 13 00:46:53.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:53.090043 systemd[1]: Starting systemd-udevd.service... May 13 00:46:53.088000 audit: BPF prog-id=7 op=LOAD May 13 00:46:53.088000 audit: BPF prog-id=8 op=LOAD May 13 00:46:53.095065 kernel: audit: type=1130 audit(1747097213.088:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:53.100029 systemd-udevd[416]: Using default interface naming scheme 'v252'. May 13 00:46:53.102691 systemd[1]: Started systemd-udevd.service. May 13 00:46:53.103181 systemd[1]: Starting dracut-pre-trigger.service... May 13 00:46:53.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:53.110598 dracut-pre-trigger[421]: rd.md=0: removing MD RAID activation May 13 00:46:53.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:53.125934 systemd[1]: Finished dracut-pre-trigger.service. May 13 00:46:53.126417 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:46:53.186024 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:46:53.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:53.246069 kernel: VMware PVSCSI driver - version 1.0.7.0-k May 13 00:46:53.246105 kernel: vmw_pvscsi: using 64bit dma May 13 00:46:53.248267 kernel: vmw_pvscsi: max_id: 16 May 13 00:46:53.248282 kernel: vmw_pvscsi: setting ring_pages to 8 May 13 00:46:53.250063 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI May 13 00:46:53.252062 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 May 13 00:46:53.265083 kernel: vmw_pvscsi: enabling reqCallThreshold May 13 00:46:53.265094 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps May 13 00:46:53.265159 kernel: vmw_pvscsi: driver-based request coalescing enabled May 13 00:46:53.265168 kernel: vmw_pvscsi: using MSI-X May 13 00:46:53.268066 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 May 13 00:46:53.273065 kernel: cryptd: max_cpu_qlen set to 1000 May 13 00:46:53.281063 kernel: libata version 3.00 loaded. May 13 00:46:53.283476 kernel: ata_piix 0000:00:07.1: version 2.13 May 13 00:46:53.289277 kernel: scsi host1: ata_piix May 13 00:46:53.289845 kernel: AVX2 version of gcm_enc/dec engaged. May 13 00:46:53.289855 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 May 13 00:46:53.289920 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 May 13 00:46:53.289983 kernel: AES CTR mode by8 optimization enabled May 13 00:46:53.289992 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 May 13 00:46:53.290071 kernel: scsi host2: ata_piix May 13 00:46:53.290138 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 May 13 00:46:53.290146 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 May 13 00:46:53.455077 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 May 13 00:46:53.459067 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 May 13 00:46:53.470163 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) May 13 00:46:53.475533 kernel: sd 0:0:0:0: [sda] Write Protect is off May 13 00:46:53.475604 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 May 13 00:46:53.475665 kernel: sd 0:0:0:0: [sda] Cache data unavailable May 13 00:46:53.475723 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through May 13 00:46:53.475780 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 13 00:46:53.475789 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 13 00:46:53.497605 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray May 13 00:46:53.515342 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 13 00:46:53.515357 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 13 00:46:53.588073 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (464) May 13 00:46:53.591884 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 00:46:53.595161 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 00:46:53.598041 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:46:53.600192 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 00:46:53.600341 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 00:46:53.601120 systemd[1]: Starting disk-uuid.service... May 13 00:46:53.643071 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 13 00:46:53.663065 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 13 00:46:54.681720 disk-uuid[549]: The operation has completed successfully. May 13 00:46:54.682637 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 13 00:46:54.717215 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 00:46:54.717511 systemd[1]: Finished disk-uuid.service. May 13 00:46:54.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:54.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:54.718308 systemd[1]: Starting verity-setup.service... May 13 00:46:54.728069 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 13 00:46:54.861786 systemd[1]: Found device dev-mapper-usr.device. May 13 00:46:54.863144 systemd[1]: Mounting sysusr-usr.mount... May 13 00:46:54.864470 systemd[1]: Finished verity-setup.service. May 13 00:46:54.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:54.933071 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 00:46:54.933192 systemd[1]: Mounted sysusr-usr.mount. May 13 00:46:54.934066 systemd[1]: Starting afterburn-network-kargs.service... May 13 00:46:54.934864 systemd[1]: Starting ignition-setup.service... May 13 00:46:54.982681 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:46:54.982723 kernel: BTRFS info (device sda6): using free space tree May 13 00:46:54.982735 kernel: BTRFS info (device sda6): has skinny extents May 13 00:46:54.989073 kernel: BTRFS info (device sda6): enabling ssd optimizations May 13 00:46:54.997493 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 00:46:55.006968 systemd[1]: Finished ignition-setup.service. May 13 00:46:55.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.007594 systemd[1]: Starting ignition-fetch-offline.service... May 13 00:46:55.131805 systemd[1]: Finished afterburn-network-kargs.service. May 13 00:46:55.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.132601 systemd[1]: Starting parse-ip-for-networkd.service... May 13 00:46:55.188551 systemd[1]: Finished parse-ip-for-networkd.service. May 13 00:46:55.189400 systemd[1]: Starting systemd-networkd.service... May 13 00:46:55.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.188000 audit: BPF prog-id=9 op=LOAD May 13 00:46:55.202107 systemd-networkd[735]: lo: Link UP May 13 00:46:55.202113 systemd-networkd[735]: lo: Gained carrier May 13 00:46:55.202373 systemd-networkd[735]: Enumeration completed May 13 00:46:55.202557 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. May 13 00:46:55.206072 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 13 00:46:55.206190 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 13 00:46:55.202945 systemd[1]: Started systemd-networkd.service. May 13 00:46:55.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.203090 systemd[1]: Reached target network.target. May 13 00:46:55.203581 systemd[1]: Starting iscsiuio.service... May 13 00:46:55.205066 systemd-networkd[735]: ens192: Link UP May 13 00:46:55.205068 systemd-networkd[735]: ens192: Gained carrier May 13 00:46:55.209110 systemd[1]: Started iscsiuio.service. May 13 00:46:55.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.209783 systemd[1]: Starting iscsid.service... May 13 00:46:55.211713 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 00:46:55.211713 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 00:46:55.211713 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 00:46:55.211713 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 00:46:55.211713 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 00:46:55.212668 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 00:46:55.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.212860 systemd[1]: Started iscsid.service. May 13 00:46:55.213354 systemd[1]: Starting dracut-initqueue.service... May 13 00:46:55.219550 systemd[1]: Finished dracut-initqueue.service. May 13 00:46:55.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.219842 systemd[1]: Reached target remote-fs-pre.target. May 13 00:46:55.220049 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:46:55.220268 systemd[1]: Reached target remote-fs.target. May 13 00:46:55.220827 systemd[1]: Starting dracut-pre-mount.service... May 13 00:46:55.225543 systemd[1]: Finished dracut-pre-mount.service. May 13 00:46:55.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.307394 ignition[606]: Ignition 2.14.0 May 13 00:46:55.307403 ignition[606]: Stage: fetch-offline May 13 00:46:55.307464 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 00:46:55.307483 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 13 00:46:55.310625 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 13 00:46:55.310714 ignition[606]: parsed url from cmdline: "" May 13 00:46:55.310717 ignition[606]: no config URL provided May 13 00:46:55.310721 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" May 13 00:46:55.310727 ignition[606]: no config at "/usr/lib/ignition/user.ign" May 13 00:46:55.311152 ignition[606]: config successfully fetched May 13 00:46:55.311171 ignition[606]: parsing config with SHA512: 1194859eb93c693483ba9f8ddf2c417468c60939b834d8f74a00f5fb3a375e68f52bb2b2a1e8a247ea9319ee141b16f0feebdc10f786357db9bfe25e77bdd3c6 May 13 00:46:55.322798 unknown[606]: fetched base config from "system" May 13 00:46:55.322806 unknown[606]: fetched user config from "vmware" May 13 00:46:55.323217 ignition[606]: fetch-offline: fetch-offline passed May 13 00:46:55.323268 ignition[606]: Ignition finished successfully May 13 00:46:55.323917 systemd[1]: Finished ignition-fetch-offline.service. May 13 00:46:55.324099 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 13 00:46:55.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.324882 systemd[1]: Starting ignition-kargs.service... May 13 00:46:55.330129 ignition[754]: Ignition 2.14.0 May 13 00:46:55.330135 ignition[754]: Stage: kargs May 13 00:46:55.330196 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 00:46:55.330207 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 13 00:46:55.331480 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 13 00:46:55.332769 ignition[754]: kargs: kargs passed May 13 00:46:55.332798 ignition[754]: Ignition finished successfully May 13 00:46:55.333705 systemd[1]: Finished ignition-kargs.service. May 13 00:46:55.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.334332 systemd[1]: Starting ignition-disks.service... May 13 00:46:55.338398 ignition[760]: Ignition 2.14.0 May 13 00:46:55.338593 ignition[760]: Stage: disks May 13 00:46:55.338763 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 00:46:55.338917 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 13 00:46:55.340197 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 13 00:46:55.341835 ignition[760]: disks: disks passed May 13 00:46:55.341868 ignition[760]: Ignition finished successfully May 13 00:46:55.342443 systemd[1]: Finished ignition-disks.service. May 13 00:46:55.342600 systemd[1]: Reached target initrd-root-device.target. May 13 00:46:55.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.342707 systemd[1]: Reached target local-fs-pre.target. May 13 00:46:55.342867 systemd[1]: Reached target local-fs.target. May 13 00:46:55.343025 systemd[1]: Reached target sysinit.target. May 13 00:46:55.343177 systemd[1]: Reached target basic.target. May 13 00:46:55.343772 systemd[1]: Starting systemd-fsck-root.service... May 13 00:46:55.423720 systemd-fsck[768]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 13 00:46:55.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.425070 systemd[1]: Finished systemd-fsck-root.service. May 13 00:46:55.425793 systemd[1]: Mounting sysroot.mount... May 13 00:46:55.434416 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 00:46:55.434313 systemd[1]: Mounted sysroot.mount. May 13 00:46:55.434687 systemd[1]: Reached target initrd-root-fs.target. May 13 00:46:55.435843 systemd[1]: Mounting sysroot-usr.mount... May 13 00:46:55.436525 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 00:46:55.436773 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 00:46:55.437039 systemd[1]: Reached target ignition-diskful.target. May 13 00:46:55.438150 systemd[1]: Mounted sysroot-usr.mount. May 13 00:46:55.438918 systemd[1]: Starting initrd-setup-root.service... May 13 00:46:55.442497 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory May 13 00:46:55.446937 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory May 13 00:46:55.449811 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory May 13 00:46:55.452527 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory May 13 00:46:55.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.499811 systemd[1]: Finished initrd-setup-root.service. May 13 00:46:55.500364 systemd[1]: Starting ignition-mount.service... May 13 00:46:55.500791 systemd[1]: Starting sysroot-boot.service... May 13 00:46:55.503944 bash[819]: umount: /sysroot/usr/share/oem: not mounted. May 13 00:46:55.508610 ignition[820]: INFO : Ignition 2.14.0 May 13 00:46:55.508610 ignition[820]: INFO : Stage: mount May 13 00:46:55.508881 ignition[820]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 00:46:55.508881 ignition[820]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 13 00:46:55.509976 ignition[820]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 13 00:46:55.511257 ignition[820]: INFO : mount: mount passed May 13 00:46:55.511369 ignition[820]: INFO : Ignition finished successfully May 13 00:46:55.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.511841 systemd[1]: Finished ignition-mount.service. May 13 00:46:55.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:55.590522 systemd[1]: Finished sysroot-boot.service. May 13 00:46:55.883725 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 00:46:55.913123 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (829) May 13 00:46:55.916203 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 13 00:46:55.916230 kernel: BTRFS info (device sda6): using free space tree May 13 00:46:55.916241 kernel: BTRFS info (device sda6): has skinny extents May 13 00:46:55.920078 kernel: BTRFS info (device sda6): enabling ssd optimizations May 13 00:46:55.921790 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 00:46:55.922407 systemd[1]: Starting ignition-files.service... May 13 00:46:55.932072 ignition[849]: INFO : Ignition 2.14.0 May 13 00:46:55.932072 ignition[849]: INFO : Stage: files May 13 00:46:55.932403 ignition[849]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 00:46:55.932403 ignition[849]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 13 00:46:55.933502 ignition[849]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 13 00:46:55.938287 ignition[849]: DEBUG : files: compiled without relabeling support, skipping May 13 00:46:55.938857 ignition[849]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 00:46:55.938857 ignition[849]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 00:46:55.940819 ignition[849]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 00:46:55.941067 ignition[849]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 00:46:55.941880 unknown[849]: wrote ssh authorized keys file for user: core May 13 00:46:55.942118 ignition[849]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 00:46:55.942434 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 00:46:55.942612 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 13 00:46:56.028333 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 13 00:46:56.170883 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 13 00:46:56.171130 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 13 00:46:56.171130 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 13 00:46:56.171130 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 13 00:46:56.171130 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 13 00:46:56.171731 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:46:56.171731 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 13 00:46:56.171731 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:46:56.173196 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 13 00:46:56.176107 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:46:56.176275 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 00:46:56.176275 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 00:46:56.176275 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 00:46:56.180216 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 13 00:46:56.180388 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 13 00:46:56.182967 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1057110351" May 13 00:46:56.183181 ignition[849]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1057110351": device or resource busy May 13 00:46:56.183384 ignition[849]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1057110351", trying btrfs: device or resource busy May 13 00:46:56.183597 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1057110351" May 13 00:46:56.183836 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1057110351" May 13 00:46:56.191943 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1057110351" May 13 00:46:56.192751 systemd[1]: mnt-oem1057110351.mount: Deactivated successfully. May 13 00:46:56.193134 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1057110351" May 13 00:46:56.193332 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 13 00:46:56.193528 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 00:46:56.193770 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 13 00:46:56.736987 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 13 00:46:57.015676 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 13 00:46:57.016385 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 13 00:46:57.016725 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 13 00:46:57.016967 ignition[849]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" May 13 00:46:57.017159 ignition[849]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" May 13 00:46:57.017340 ignition[849]: INFO : files: op(11): [started] processing unit "prepare-helm.service" May 13 00:46:57.017540 ignition[849]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:46:57.017850 ignition[849]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 13 00:46:57.018343 ignition[849]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" May 13 00:46:57.018517 ignition[849]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" May 13 00:46:57.018722 ignition[849]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:46:57.019028 ignition[849]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 13 00:46:57.019288 ignition[849]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" May 13 00:46:57.019482 ignition[849]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" May 13 00:46:57.019726 ignition[849]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" May 13 00:46:57.019917 ignition[849]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" May 13 00:46:57.020134 ignition[849]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" May 13 00:46:57.020333 ignition[849]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" May 13 00:46:57.020521 ignition[849]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:46:57.180801 ignition[849]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 13 00:46:57.181072 ignition[849]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" May 13 00:46:57.181364 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 00:46:57.181625 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 00:46:57.181814 ignition[849]: INFO : files: files passed May 13 00:46:57.181955 ignition[849]: INFO : Ignition finished successfully May 13 00:46:57.187555 kernel: kauditd_printk_skb: 24 callbacks suppressed May 13 00:46:57.187589 kernel: audit: type=1130 audit(1747097217.182:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.183391 systemd[1]: Finished ignition-files.service. May 13 00:46:57.183951 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 00:46:57.184079 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 00:46:57.184449 systemd[1]: Starting ignition-quench.service... May 13 00:46:57.190008 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 00:46:57.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.190063 systemd[1]: Finished ignition-quench.service. May 13 00:46:57.193133 kernel: audit: type=1130 audit(1747097217.189:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.193900 initrd-setup-root-after-ignition[875]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 00:46:57.195869 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 00:46:57.198704 kernel: audit: type=1131 audit(1747097217.189:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.198721 kernel: audit: type=1130 audit(1747097217.194:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.196036 systemd[1]: Reached target ignition-complete.target. May 13 00:46:57.199390 systemd[1]: Starting initrd-parse-etc.service... May 13 00:46:57.207862 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 00:46:57.208116 systemd[1]: Finished initrd-parse-etc.service. May 13 00:46:57.208397 systemd[1]: Reached target initrd-fs.target. May 13 00:46:57.208604 systemd[1]: Reached target initrd.target. May 13 00:46:57.208828 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 00:46:57.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.209440 systemd[1]: Starting dracut-pre-pivot.service... May 13 00:46:57.214202 kernel: audit: type=1130 audit(1747097217.207:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.214218 kernel: audit: type=1131 audit(1747097217.207:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.216235 systemd[1]: Finished dracut-pre-pivot.service. May 13 00:46:57.216695 systemd[1]: Starting initrd-cleanup.service... May 13 00:46:57.220481 kernel: audit: type=1130 audit(1747097217.215:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.222599 systemd[1]: Stopped target nss-lookup.target. May 13 00:46:57.222740 systemd[1]: Stopped target remote-cryptsetup.target. May 13 00:46:57.222893 systemd[1]: Stopped target timers.target. May 13 00:46:57.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.223170 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 00:46:57.230032 kernel: audit: type=1131 audit(1747097217.222:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.230140 kernel: audit: type=1131 audit(1747097217.226:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.223235 systemd[1]: Stopped dracut-pre-pivot.service. May 13 00:46:57.223653 systemd[1]: Stopped target initrd.target. May 13 00:46:57.226171 systemd[1]: Stopped target basic.target. May 13 00:46:57.226301 systemd[1]: Stopped target ignition-complete.target. May 13 00:46:57.226431 systemd[1]: Stopped target ignition-diskful.target. May 13 00:46:57.226558 systemd[1]: Stopped target initrd-root-device.target. May 13 00:46:57.226690 systemd[1]: Stopped target remote-fs.target. May 13 00:46:57.226813 systemd[1]: Stopped target remote-fs-pre.target. May 13 00:46:57.226941 systemd[1]: Stopped target sysinit.target. May 13 00:46:57.227113 systemd[1]: Stopped target local-fs.target. May 13 00:46:57.227234 systemd[1]: Stopped target local-fs-pre.target. May 13 00:46:57.227358 systemd[1]: Stopped target swap.target. May 13 00:46:57.227459 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 00:46:57.227518 systemd[1]: Stopped dracut-pre-mount.service. May 13 00:46:57.227677 systemd[1]: Stopped target cryptsetup.target. May 13 00:46:57.231756 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 00:46:57.231822 systemd[1]: Stopped dracut-initqueue.service. May 13 00:46:57.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.232228 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 00:46:57.235170 kernel: audit: type=1131 audit(1747097217.231:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.232286 systemd[1]: Stopped ignition-fetch-offline.service. May 13 00:46:57.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.234751 systemd-networkd[735]: ens192: Gained IPv6LL May 13 00:46:57.235169 systemd[1]: Stopped target paths.target. May 13 00:46:57.235297 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 00:46:57.238183 systemd[1]: Stopped systemd-ask-password-console.path. May 13 00:46:57.238335 systemd[1]: Stopped target slices.target. May 13 00:46:57.238514 systemd[1]: Stopped target sockets.target. May 13 00:46:57.238684 systemd[1]: iscsid.socket: Deactivated successfully. May 13 00:46:57.238725 systemd[1]: Closed iscsid.socket. May 13 00:46:57.238890 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 00:46:57.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.238949 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 00:46:57.239120 systemd[1]: ignition-files.service: Deactivated successfully. May 13 00:46:57.239210 systemd[1]: Stopped ignition-files.service. May 13 00:46:57.239708 systemd[1]: Stopping ignition-mount.service... May 13 00:46:57.239879 systemd[1]: Stopping iscsiuio.service... May 13 00:46:57.240358 systemd[1]: Stopping sysroot-boot.service... May 13 00:46:57.240457 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 00:46:57.240524 systemd[1]: Stopped systemd-udev-trigger.service. May 13 00:46:57.240677 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 00:46:57.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.240729 systemd[1]: Stopped dracut-pre-trigger.service. May 13 00:46:57.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.249166 ignition[888]: INFO : Ignition 2.14.0 May 13 00:46:57.249166 ignition[888]: INFO : Stage: umount May 13 00:46:57.249166 ignition[888]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 00:46:57.249166 ignition[888]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 13 00:46:57.243340 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 00:46:57.243386 systemd[1]: Stopped iscsiuio.service. May 13 00:46:57.245546 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 00:46:57.245596 systemd[1]: Finished initrd-cleanup.service. May 13 00:46:57.246353 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 00:46:57.246384 systemd[1]: Closed iscsiuio.socket. May 13 00:46:57.250728 ignition[888]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 13 00:46:57.252282 ignition[888]: INFO : umount: umount passed May 13 00:46:57.252398 ignition[888]: INFO : Ignition finished successfully May 13 00:46:57.252922 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 00:46:57.252974 systemd[1]: Stopped ignition-mount.service. May 13 00:46:57.253207 systemd[1]: Stopped target network.target. May 13 00:46:57.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.253298 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 00:46:57.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.253320 systemd[1]: Stopped ignition-disks.service. May 13 00:46:57.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.253470 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 00:46:57.253490 systemd[1]: Stopped ignition-kargs.service. May 13 00:46:57.253642 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 00:46:57.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.253660 systemd[1]: Stopped ignition-setup.service. May 13 00:46:57.253885 systemd[1]: Stopping systemd-networkd.service... May 13 00:46:57.254761 systemd[1]: Stopping systemd-resolved.service... May 13 00:46:57.257809 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 00:46:57.257865 systemd[1]: Stopped systemd-networkd.service. May 13 00:46:57.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.258313 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 00:46:57.258334 systemd[1]: Closed systemd-networkd.socket. May 13 00:46:57.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.260000 audit: BPF prog-id=9 op=UNLOAD May 13 00:46:57.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.258889 systemd[1]: Stopping network-cleanup.service... May 13 00:46:57.258985 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 00:46:57.259012 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 00:46:57.259157 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. May 13 00:46:57.259178 systemd[1]: Stopped afterburn-network-kargs.service. May 13 00:46:57.259283 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 00:46:57.259303 systemd[1]: Stopped systemd-sysctl.service. May 13 00:46:57.259458 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 00:46:57.259477 systemd[1]: Stopped systemd-modules-load.service. May 13 00:46:57.259617 systemd[1]: Stopping systemd-udevd.service... May 13 00:46:57.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.261831 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 00:46:57.262115 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 00:46:57.264000 audit: BPF prog-id=6 op=UNLOAD May 13 00:46:57.262171 systemd[1]: Stopped systemd-resolved.service. May 13 00:46:57.264681 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 00:46:57.264729 systemd[1]: Stopped network-cleanup.service. May 13 00:46:57.268249 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 00:46:57.268320 systemd[1]: Stopped systemd-udevd.service. May 13 00:46:57.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.268680 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 00:46:57.268704 systemd[1]: Closed systemd-udevd-control.socket. May 13 00:46:57.268915 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 00:46:57.268930 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 00:46:57.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.269080 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 00:46:57.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.269101 systemd[1]: Stopped dracut-pre-udev.service. May 13 00:46:57.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.269273 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 00:46:57.269292 systemd[1]: Stopped dracut-cmdline.service. May 13 00:46:57.269432 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 00:46:57.269450 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 00:46:57.269925 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 00:46:57.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.270142 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 13 00:46:57.270169 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 13 00:46:57.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.270644 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 00:46:57.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.270671 systemd[1]: Stopped kmod-static-nodes.service. May 13 00:46:57.270881 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 00:46:57.270900 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 00:46:57.271838 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 13 00:46:57.275015 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 00:46:57.275073 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 00:46:57.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.277902 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 00:46:57.562549 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 00:46:57.562611 systemd[1]: Stopped sysroot-boot.service. May 13 00:46:57.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.562892 systemd[1]: Reached target initrd-switch-root.target. May 13 00:46:57.562980 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 00:46:57.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:46:57.563004 systemd[1]: Stopped initrd-setup-root.service. May 13 00:46:57.563636 systemd[1]: Starting initrd-switch-root.service... May 13 00:46:57.571276 systemd[1]: Switching root. May 13 00:46:57.589625 iscsid[740]: iscsid shutting down. May 13 00:46:57.589799 systemd-journald[216]: Journal stopped May 13 00:47:01.536794 systemd-journald[216]: Received SIGTERM from PID 1 (n/a). May 13 00:47:01.536815 kernel: SELinux: Class mctp_socket not defined in policy. May 13 00:47:01.536823 kernel: SELinux: Class anon_inode not defined in policy. May 13 00:47:01.536829 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 00:47:01.536834 kernel: SELinux: policy capability network_peer_controls=1 May 13 00:47:01.536841 kernel: SELinux: policy capability open_perms=1 May 13 00:47:01.536847 kernel: SELinux: policy capability extended_socket_class=1 May 13 00:47:01.536853 kernel: SELinux: policy capability always_check_network=0 May 13 00:47:01.536859 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 00:47:01.536865 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 00:47:01.536871 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 00:47:01.536876 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 00:47:01.536883 systemd[1]: Successfully loaded SELinux policy in 35.167ms. May 13 00:47:01.536891 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.185ms. May 13 00:47:01.536899 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 00:47:01.536905 systemd[1]: Detected virtualization vmware. May 13 00:47:01.536913 systemd[1]: Detected architecture x86-64. May 13 00:47:01.536919 systemd[1]: Detected first boot. May 13 00:47:01.536925 systemd[1]: Initializing machine ID from random generator. May 13 00:47:01.536932 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 00:47:01.536938 systemd[1]: Populated /etc with preset unit settings. May 13 00:47:01.536945 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:47:01.536952 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:47:01.536959 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:47:01.536967 systemd[1]: iscsid.service: Deactivated successfully. May 13 00:47:01.536973 systemd[1]: Stopped iscsid.service. May 13 00:47:01.536980 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 00:47:01.536987 systemd[1]: Stopped initrd-switch-root.service. May 13 00:47:01.536993 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 00:47:01.537000 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 00:47:01.537006 systemd[1]: Created slice system-addon\x2drun.slice. May 13 00:47:01.537014 systemd[1]: Created slice system-getty.slice. May 13 00:47:01.537020 systemd[1]: Created slice system-modprobe.slice. May 13 00:47:01.537026 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 00:47:01.537033 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 00:47:01.537040 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 00:47:01.537046 systemd[1]: Created slice user.slice. May 13 00:47:01.537072 systemd[1]: Started systemd-ask-password-console.path. May 13 00:47:01.537083 systemd[1]: Started systemd-ask-password-wall.path. May 13 00:47:01.537092 systemd[1]: Set up automount boot.automount. May 13 00:47:01.537100 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 00:47:01.537107 systemd[1]: Stopped target initrd-switch-root.target. May 13 00:47:01.537114 systemd[1]: Stopped target initrd-fs.target. May 13 00:47:01.537121 systemd[1]: Stopped target initrd-root-fs.target. May 13 00:47:01.537128 systemd[1]: Reached target integritysetup.target. May 13 00:47:01.537134 systemd[1]: Reached target remote-cryptsetup.target. May 13 00:47:01.537141 systemd[1]: Reached target remote-fs.target. May 13 00:47:01.537147 systemd[1]: Reached target slices.target. May 13 00:47:01.537155 systemd[1]: Reached target swap.target. May 13 00:47:01.537162 systemd[1]: Reached target torcx.target. May 13 00:47:01.537168 systemd[1]: Reached target veritysetup.target. May 13 00:47:01.537175 systemd[1]: Listening on systemd-coredump.socket. May 13 00:47:01.537181 systemd[1]: Listening on systemd-initctl.socket. May 13 00:47:01.537189 systemd[1]: Listening on systemd-networkd.socket. May 13 00:47:01.537197 systemd[1]: Listening on systemd-udevd-control.socket. May 13 00:47:01.537204 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 00:47:01.537211 systemd[1]: Listening on systemd-userdbd.socket. May 13 00:47:01.537218 systemd[1]: Mounting dev-hugepages.mount... May 13 00:47:01.537225 systemd[1]: Mounting dev-mqueue.mount... May 13 00:47:01.537232 systemd[1]: Mounting media.mount... May 13 00:47:01.537239 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:01.537247 systemd[1]: Mounting sys-kernel-debug.mount... May 13 00:47:01.537254 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 00:47:01.537261 systemd[1]: Mounting tmp.mount... May 13 00:47:01.537267 systemd[1]: Starting flatcar-tmpfiles.service... May 13 00:47:01.537274 systemd[1]: Starting ignition-delete-config.service... May 13 00:47:01.537281 systemd[1]: Starting kmod-static-nodes.service... May 13 00:47:01.537288 systemd[1]: Starting modprobe@configfs.service... May 13 00:47:01.537294 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:47:01.537301 systemd[1]: Starting modprobe@drm.service... May 13 00:47:01.537309 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:47:01.537316 systemd[1]: Starting modprobe@fuse.service... May 13 00:47:01.537323 systemd[1]: Starting modprobe@loop.service... May 13 00:47:01.537330 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 00:47:01.537337 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 00:47:01.537343 systemd[1]: Stopped systemd-fsck-root.service. May 13 00:47:01.537350 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 00:47:01.537357 systemd[1]: Stopped systemd-fsck-usr.service. May 13 00:47:01.537364 systemd[1]: Stopped systemd-journald.service. May 13 00:47:01.537372 systemd[1]: Starting systemd-journald.service... May 13 00:47:01.537379 systemd[1]: Starting systemd-modules-load.service... May 13 00:47:01.537386 systemd[1]: Starting systemd-network-generator.service... May 13 00:47:01.537393 systemd[1]: Starting systemd-remount-fs.service... May 13 00:47:01.537399 systemd[1]: Starting systemd-udev-trigger.service... May 13 00:47:01.537407 systemd[1]: verity-setup.service: Deactivated successfully. May 13 00:47:01.537413 systemd[1]: Stopped verity-setup.service. May 13 00:47:01.537420 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:01.537428 systemd[1]: Mounted dev-hugepages.mount. May 13 00:47:01.537436 systemd[1]: Mounted dev-mqueue.mount. May 13 00:47:01.537443 systemd[1]: Mounted media.mount. May 13 00:47:01.537449 systemd[1]: Mounted sys-kernel-debug.mount. May 13 00:47:01.537456 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 00:47:01.537463 systemd[1]: Mounted tmp.mount. May 13 00:47:01.537470 systemd[1]: Finished kmod-static-nodes.service. May 13 00:47:01.537477 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:47:01.537484 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:47:01.537491 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:47:01.537498 systemd[1]: Finished modprobe@drm.service. May 13 00:47:01.537505 systemd[1]: Finished flatcar-tmpfiles.service. May 13 00:47:01.537512 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:47:01.537519 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:47:01.537526 systemd[1]: Finished systemd-network-generator.service. May 13 00:47:01.537533 systemd[1]: Finished systemd-remount-fs.service. May 13 00:47:01.537539 systemd[1]: Reached target network-pre.target. May 13 00:47:01.537546 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 00:47:01.537555 systemd-journald[1001]: Journal started May 13 00:47:01.537585 systemd-journald[1001]: Runtime Journal (/run/log/journal/00bf563e01c14147a83f138a4af3f754) is 4.8M, max 38.8M, 34.0M free. May 13 00:46:57.828000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 00:46:57.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:46:57.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 00:46:57.945000 audit: BPF prog-id=10 op=LOAD May 13 00:46:57.945000 audit: BPF prog-id=10 op=UNLOAD May 13 00:46:57.945000 audit: BPF prog-id=11 op=LOAD May 13 00:46:57.945000 audit: BPF prog-id=11 op=UNLOAD May 13 00:46:58.162000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 00:46:58.162000 audit[921]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:58.162000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:46:58.164000 audit[921]: AVC avc: denied { associate } for pid=921 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 00:47:01.548484 systemd[1]: Starting systemd-hwdb-update.service... May 13 00:47:01.548514 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:47:01.548525 systemd[1]: Starting systemd-random-seed.service... May 13 00:47:01.548534 systemd[1]: Starting systemd-sysusers.service... May 13 00:47:01.548542 systemd[1]: Started systemd-journald.service. May 13 00:46:58.164000 audit[921]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=904 pid=921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:46:58.164000 audit: CWD cwd="/" May 13 00:46:58.164000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:46:58.164000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:46:58.164000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 00:47:01.404000 audit: BPF prog-id=12 op=LOAD May 13 00:47:01.404000 audit: BPF prog-id=3 op=UNLOAD May 13 00:47:01.404000 audit: BPF prog-id=13 op=LOAD May 13 00:47:01.404000 audit: BPF prog-id=14 op=LOAD May 13 00:47:01.404000 audit: BPF prog-id=4 op=UNLOAD May 13 00:47:01.404000 audit: BPF prog-id=5 op=UNLOAD May 13 00:47:01.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.416000 audit: BPF prog-id=12 op=UNLOAD May 13 00:47:01.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.490000 audit: BPF prog-id=15 op=LOAD May 13 00:47:01.490000 audit: BPF prog-id=16 op=LOAD May 13 00:47:01.490000 audit: BPF prog-id=17 op=LOAD May 13 00:47:01.490000 audit: BPF prog-id=13 op=UNLOAD May 13 00:47:01.490000 audit: BPF prog-id=14 op=UNLOAD May 13 00:47:01.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.533000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 00:47:01.533000 audit[1001]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffdcef6a9f0 a2=4000 a3=7ffdcef6aa8c items=0 ppid=1 pid=1001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:47:01.533000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 00:47:01.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.403411 systemd[1]: Queued start job for default target multi-user.target. May 13 00:46:58.159883 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:47:01.403419 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 13 00:46:58.160421 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:47:01.406717 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 00:46:58.160445 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:47:01.557461 systemd[1]: Finished systemd-modules-load.service. May 13 00:46:58.160477 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 00:46:58.160486 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 00:46:58.160518 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 00:46:58.160535 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 00:46:58.160744 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 00:47:01.558176 jq[988]: true May 13 00:46:58.160784 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 00:46:58.160800 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 00:46:58.162726 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 00:46:58.162762 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 00:46:58.162787 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 00:46:58.162806 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 00:46:58.162829 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 00:46:58.162847 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:46:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 00:47:00.447889 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:47:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:47:00.448077 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:47:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:47:01.558724 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 00:47:00.448165 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:47:00Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:47:01.558818 systemd[1]: Finished modprobe@configfs.service. May 13 00:47:01.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:00.448283 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:47:00Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 00:47:01.559119 systemd[1]: Finished systemd-random-seed.service. May 13 00:47:00.448327 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:47:00Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 00:47:01.559326 systemd[1]: Reached target first-boot-complete.target. May 13 00:47:00.448375 /usr/lib/systemd/system-generators/torcx-generator[921]: time="2025-05-13T00:47:00Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 00:47:01.560250 systemd[1]: Mounting sys-kernel-config.mount... May 13 00:47:01.561022 systemd[1]: Starting systemd-journal-flush.service... May 13 00:47:01.561903 systemd[1]: Starting systemd-sysctl.service... May 13 00:47:01.562773 systemd[1]: Mounted sys-kernel-config.mount. May 13 00:47:01.575918 jq[1040]: true May 13 00:47:01.581155 kernel: fuse: init (API version 7.34) May 13 00:47:01.581515 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 00:47:01.581613 systemd[1]: Finished modprobe@fuse.service. May 13 00:47:01.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.582579 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 00:47:01.584509 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 00:47:01.585823 systemd-journald[1001]: Time spent on flushing to /var/log/journal/00bf563e01c14147a83f138a4af3f754 is 30.631ms for 1993 entries. May 13 00:47:01.585823 systemd-journald[1001]: System Journal (/var/log/journal/00bf563e01c14147a83f138a4af3f754) is 8.0M, max 584.8M, 576.8M free. May 13 00:47:01.656575 systemd-journald[1001]: Received client request to flush runtime journal. May 13 00:47:01.656607 kernel: loop: module loaded May 13 00:47:01.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.595399 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:47:01.656827 udevadm[1048]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 13 00:47:01.595483 systemd[1]: Finished modprobe@loop.service. May 13 00:47:01.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.595678 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:47:01.645961 systemd[1]: Finished systemd-sysctl.service. May 13 00:47:01.646732 systemd[1]: Finished systemd-udev-trigger.service. May 13 00:47:01.647617 systemd[1]: Starting systemd-udev-settle.service... May 13 00:47:01.656989 systemd[1]: Finished systemd-journal-flush.service. May 13 00:47:01.766862 systemd[1]: Finished systemd-sysusers.service. May 13 00:47:01.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.767887 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 00:47:01.796279 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 00:47:01.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:01.996706 ignition[1045]: Ignition 2.14.0 May 13 00:47:01.997041 ignition[1045]: deleting config from guestinfo properties May 13 00:47:02.000480 ignition[1045]: Successfully deleted config May 13 00:47:02.001071 systemd[1]: Finished ignition-delete-config.service. May 13 00:47:02.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.270900 systemd[1]: Finished systemd-hwdb-update.service. May 13 00:47:02.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.271977 systemd[1]: Starting systemd-udevd.service... May 13 00:47:02.275321 kernel: kauditd_printk_skb: 97 callbacks suppressed May 13 00:47:02.275368 kernel: audit: type=1130 audit(1747097222.269:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.275385 kernel: audit: type=1334 audit(1747097222.270:134): prog-id=18 op=LOAD May 13 00:47:02.270000 audit: BPF prog-id=18 op=LOAD May 13 00:47:02.276147 kernel: audit: type=1334 audit(1747097222.270:135): prog-id=19 op=LOAD May 13 00:47:02.270000 audit: BPF prog-id=19 op=LOAD May 13 00:47:02.270000 audit: BPF prog-id=7 op=UNLOAD May 13 00:47:02.270000 audit: BPF prog-id=8 op=UNLOAD May 13 00:47:02.278845 kernel: audit: type=1334 audit(1747097222.270:136): prog-id=7 op=UNLOAD May 13 00:47:02.278878 kernel: audit: type=1334 audit(1747097222.270:137): prog-id=8 op=UNLOAD May 13 00:47:02.287567 systemd-udevd[1057]: Using default interface naming scheme 'v252'. May 13 00:47:02.422262 kernel: audit: type=1130 audit(1747097222.416:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.417688 systemd[1]: Started systemd-udevd.service. May 13 00:47:02.422082 systemd[1]: Starting systemd-networkd.service... May 13 00:47:02.420000 audit: BPF prog-id=20 op=LOAD May 13 00:47:02.426079 kernel: audit: type=1334 audit(1747097222.420:139): prog-id=20 op=LOAD May 13 00:47:02.432250 kernel: audit: type=1334 audit(1747097222.428:140): prog-id=21 op=LOAD May 13 00:47:02.432290 kernel: audit: type=1334 audit(1747097222.429:141): prog-id=22 op=LOAD May 13 00:47:02.432304 kernel: audit: type=1334 audit(1747097222.430:142): prog-id=23 op=LOAD May 13 00:47:02.428000 audit: BPF prog-id=21 op=LOAD May 13 00:47:02.429000 audit: BPF prog-id=22 op=LOAD May 13 00:47:02.430000 audit: BPF prog-id=23 op=LOAD May 13 00:47:02.432108 systemd[1]: Starting systemd-userdbd.service... May 13 00:47:02.456600 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 00:47:02.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.466295 systemd[1]: Started systemd-userdbd.service. May 13 00:47:02.499092 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 00:47:02.507069 kernel: ACPI: button: Power Button [PWRF] May 13 00:47:02.569000 audit[1066]: AVC avc: denied { confidentiality } for pid=1066 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 00:47:02.569000 audit[1066]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555c454ee990 a1=338ac a2=7fb7ea269bc5 a3=5 items=110 ppid=1057 pid=1066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:47:02.569000 audit: CWD cwd="/" May 13 00:47:02.569000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=1 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=2 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=3 name=(null) inode=17190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=4 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=5 name=(null) inode=17191 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=6 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=7 name=(null) inode=17192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=8 name=(null) inode=17192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=9 name=(null) inode=17193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=10 name=(null) inode=17192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=11 name=(null) inode=17194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=12 name=(null) inode=17192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=13 name=(null) inode=17195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=14 name=(null) inode=17192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=15 name=(null) inode=17196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=16 name=(null) inode=17192 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=17 name=(null) inode=17197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=18 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=19 name=(null) inode=17198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=20 name=(null) inode=17198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=21 name=(null) inode=17199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=22 name=(null) inode=17198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=23 name=(null) inode=17200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=24 name=(null) inode=17198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=25 name=(null) inode=17201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=26 name=(null) inode=17198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=27 name=(null) inode=17202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=28 name=(null) inode=17198 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=29 name=(null) inode=17203 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=30 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=31 name=(null) inode=17204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=32 name=(null) inode=17204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=33 name=(null) inode=17205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=34 name=(null) inode=17204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=35 name=(null) inode=17206 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=36 name=(null) inode=17204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=37 name=(null) inode=17207 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=38 name=(null) inode=17204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=39 name=(null) inode=17208 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=40 name=(null) inode=17204 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=41 name=(null) inode=17209 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=42 name=(null) inode=17189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=43 name=(null) inode=17210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=44 name=(null) inode=17210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=45 name=(null) inode=17211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=46 name=(null) inode=17210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=47 name=(null) inode=17212 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=48 name=(null) inode=17210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=49 name=(null) inode=17213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=50 name=(null) inode=17210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=51 name=(null) inode=17214 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=52 name=(null) inode=17210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=53 name=(null) inode=17215 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=55 name=(null) inode=17216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=56 name=(null) inode=17216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=57 name=(null) inode=17217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=58 name=(null) inode=17216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=59 name=(null) inode=17218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=60 name=(null) inode=17216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=61 name=(null) inode=17219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=62 name=(null) inode=17219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=63 name=(null) inode=17220 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=64 name=(null) inode=17219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=65 name=(null) inode=17221 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=66 name=(null) inode=17219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=67 name=(null) inode=17222 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=68 name=(null) inode=17219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=69 name=(null) inode=17223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=70 name=(null) inode=17219 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=71 name=(null) inode=17224 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=72 name=(null) inode=17216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=73 name=(null) inode=17225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=74 name=(null) inode=17225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=75 name=(null) inode=17226 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=76 name=(null) inode=17225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=77 name=(null) inode=17227 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=78 name=(null) inode=17225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=79 name=(null) inode=17228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=80 name=(null) inode=17225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=81 name=(null) inode=17229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=82 name=(null) inode=17225 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=83 name=(null) inode=17230 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=84 name=(null) inode=17216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=85 name=(null) inode=17231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=86 name=(null) inode=17231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=87 name=(null) inode=17232 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=88 name=(null) inode=17231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.579206 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 May 13 00:47:02.584693 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc May 13 00:47:02.584773 kernel: Guest personality initialized and is active May 13 00:47:02.569000 audit: PATH item=89 name=(null) inode=17233 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=90 name=(null) inode=17231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=91 name=(null) inode=17234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=92 name=(null) inode=17231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=93 name=(null) inode=17235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=94 name=(null) inode=17231 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=95 name=(null) inode=17236 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=96 name=(null) inode=17216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=97 name=(null) inode=17237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=98 name=(null) inode=17237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=99 name=(null) inode=17238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=100 name=(null) inode=17237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=101 name=(null) inode=17239 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=102 name=(null) inode=17237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=103 name=(null) inode=17240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=104 name=(null) inode=17237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=105 name=(null) inode=17241 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=106 name=(null) inode=17237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=107 name=(null) inode=17242 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PATH item=109 name=(null) inode=17243 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:47:02.569000 audit: PROCTITLE proctitle="(udev-worker)" May 13 00:47:02.586478 kernel: VMCI host device registered (name=vmci, major=10, minor=125) May 13 00:47:02.586505 kernel: Initialized host personality May 13 00:47:02.589106 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 May 13 00:47:02.594356 systemd-networkd[1059]: lo: Link UP May 13 00:47:02.594361 systemd-networkd[1059]: lo: Gained carrier May 13 00:47:02.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.595005 systemd-networkd[1059]: Enumeration completed May 13 00:47:02.595065 systemd[1]: Started systemd-networkd.service. May 13 00:47:02.595428 systemd-networkd[1059]: ens192: Configuring with /etc/systemd/network/00-vmware.network. May 13 00:47:02.598372 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 13 00:47:02.598498 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 13 00:47:02.599590 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready May 13 00:47:02.599956 systemd-networkd[1059]: ens192: Link UP May 13 00:47:02.600126 systemd-networkd[1059]: ens192: Gained carrier May 13 00:47:02.606063 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! May 13 00:47:02.616071 kernel: mousedev: PS/2 mouse device common for all mice May 13 00:47:02.623234 (udev-worker)[1069]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. May 13 00:47:02.642073 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 00:47:02.646335 systemd[1]: Finished systemd-udev-settle.service. May 13 00:47:02.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.647242 systemd[1]: Starting lvm2-activation-early.service... May 13 00:47:02.665884 lvm[1090]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:47:02.690584 systemd[1]: Finished lvm2-activation-early.service. May 13 00:47:02.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.690769 systemd[1]: Reached target cryptsetup.target. May 13 00:47:02.691673 systemd[1]: Starting lvm2-activation.service... May 13 00:47:02.694254 lvm[1091]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 00:47:02.714658 systemd[1]: Finished lvm2-activation.service. May 13 00:47:02.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.714849 systemd[1]: Reached target local-fs-pre.target. May 13 00:47:02.714952 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 00:47:02.714970 systemd[1]: Reached target local-fs.target. May 13 00:47:02.715070 systemd[1]: Reached target machines.target. May 13 00:47:02.716048 systemd[1]: Starting ldconfig.service... May 13 00:47:02.716633 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:47:02.716674 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:47:02.717456 systemd[1]: Starting systemd-boot-update.service... May 13 00:47:02.718196 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 00:47:02.719107 systemd[1]: Starting systemd-machine-id-commit.service... May 13 00:47:02.720314 systemd[1]: Starting systemd-sysext.service... May 13 00:47:02.726022 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1093 (bootctl) May 13 00:47:02.726738 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 00:47:02.729701 systemd[1]: Unmounting usr-share-oem.mount... May 13 00:47:02.734246 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 00:47:02.734343 systemd[1]: Unmounted usr-share-oem.mount. May 13 00:47:02.741465 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 00:47:02.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:02.752066 kernel: loop0: detected capacity change from 0 to 210664 May 13 00:47:03.325322 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 00:47:03.326389 systemd[1]: Finished systemd-machine-id-commit.service. May 13 00:47:03.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.342068 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 00:47:03.358345 systemd-fsck[1103]: fsck.fat 4.2 (2021-01-31) May 13 00:47:03.358345 systemd-fsck[1103]: /dev/sda1: 790 files, 120692/258078 clusters May 13 00:47:03.359510 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 00:47:03.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.360564 systemd[1]: Mounting boot.mount... May 13 00:47:03.365070 kernel: loop1: detected capacity change from 0 to 210664 May 13 00:47:03.371593 systemd[1]: Mounted boot.mount. May 13 00:47:03.381744 systemd[1]: Finished systemd-boot-update.service. May 13 00:47:03.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.384062 (sd-sysext)[1107]: Using extensions 'kubernetes'. May 13 00:47:03.384566 (sd-sysext)[1107]: Merged extensions into '/usr'. May 13 00:47:03.395468 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:03.396528 systemd[1]: Mounting usr-share-oem.mount... May 13 00:47:03.397263 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:47:03.398660 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:47:03.399377 systemd[1]: Starting modprobe@loop.service... May 13 00:47:03.400151 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:47:03.400235 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:47:03.400315 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:03.401660 systemd[1]: Mounted usr-share-oem.mount. May 13 00:47:03.402298 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:47:03.402375 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:47:03.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.402671 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:47:03.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.402738 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:47:03.403021 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:47:03.403100 systemd[1]: Finished modprobe@loop.service. May 13 00:47:03.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.403409 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:47:03.403470 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:47:03.404137 systemd[1]: Finished systemd-sysext.service. May 13 00:47:03.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.404986 systemd[1]: Starting ensure-sysext.service... May 13 00:47:03.405808 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 00:47:03.410747 systemd[1]: Reloading. May 13 00:47:03.415339 systemd-tmpfiles[1114]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 00:47:03.418041 systemd-tmpfiles[1114]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 00:47:03.420100 systemd-tmpfiles[1114]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 00:47:03.451733 /usr/lib/systemd/system-generators/torcx-generator[1133]: time="2025-05-13T00:47:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:47:03.451749 /usr/lib/systemd/system-generators/torcx-generator[1133]: time="2025-05-13T00:47:03Z" level=info msg="torcx already run" May 13 00:47:03.531107 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:47:03.531232 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:47:03.545157 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:47:03.585000 audit: BPF prog-id=24 op=LOAD May 13 00:47:03.585000 audit: BPF prog-id=20 op=UNLOAD May 13 00:47:03.586000 audit: BPF prog-id=25 op=LOAD May 13 00:47:03.586000 audit: BPF prog-id=26 op=LOAD May 13 00:47:03.586000 audit: BPF prog-id=18 op=UNLOAD May 13 00:47:03.586000 audit: BPF prog-id=19 op=UNLOAD May 13 00:47:03.587000 audit: BPF prog-id=27 op=LOAD May 13 00:47:03.587000 audit: BPF prog-id=21 op=UNLOAD May 13 00:47:03.587000 audit: BPF prog-id=28 op=LOAD May 13 00:47:03.587000 audit: BPF prog-id=29 op=LOAD May 13 00:47:03.587000 audit: BPF prog-id=22 op=UNLOAD May 13 00:47:03.587000 audit: BPF prog-id=23 op=UNLOAD May 13 00:47:03.589000 audit: BPF prog-id=30 op=LOAD May 13 00:47:03.589000 audit: BPF prog-id=15 op=UNLOAD May 13 00:47:03.589000 audit: BPF prog-id=31 op=LOAD May 13 00:47:03.589000 audit: BPF prog-id=32 op=LOAD May 13 00:47:03.589000 audit: BPF prog-id=16 op=UNLOAD May 13 00:47:03.589000 audit: BPF prog-id=17 op=UNLOAD May 13 00:47:03.597725 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 00:47:03.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.601815 systemd[1]: Starting audit-rules.service... May 13 00:47:03.602648 systemd[1]: Starting clean-ca-certificates.service... May 13 00:47:03.603000 audit: BPF prog-id=33 op=LOAD May 13 00:47:03.603529 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 00:47:03.606145 systemd[1]: Starting systemd-resolved.service... May 13 00:47:03.605000 audit: BPF prog-id=34 op=LOAD May 13 00:47:03.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.607682 systemd[1]: Starting systemd-timesyncd.service... May 13 00:47:03.608591 systemd[1]: Starting systemd-update-utmp.service... May 13 00:47:03.609166 systemd[1]: Finished clean-ca-certificates.service. May 13 00:47:03.611947 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:47:03.614619 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:03.615359 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:47:03.616244 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:47:03.616948 systemd[1]: Starting modprobe@loop.service... May 13 00:47:03.617077 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:47:03.617151 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:47:03.617223 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:47:03.617277 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:03.617935 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:47:03.618188 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:47:03.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.618450 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:47:03.625238 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:47:03.625318 systemd[1]: Finished modprobe@loop.service. May 13 00:47:03.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.625665 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:47:03.625741 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:47:03.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.625951 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:47:03.625000 audit[1200]: SYSTEM_BOOT pid=1200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 00:47:03.627128 systemd[1]: Finished systemd-update-utmp.service. May 13 00:47:03.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.629102 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:03.629812 systemd[1]: Starting modprobe@dm_mod.service... May 13 00:47:03.630598 systemd[1]: Starting modprobe@efi_pstore.service... May 13 00:47:03.631655 systemd[1]: Starting modprobe@loop.service... May 13 00:47:03.631937 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:47:03.632049 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:47:03.632392 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:47:03.632452 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:03.636269 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:03.637439 systemd[1]: Starting modprobe@drm.service... May 13 00:47:03.637611 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 00:47:03.637692 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:47:03.639010 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 00:47:03.639195 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 00:47:03.639432 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 00:47:03.641973 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 00:47:03.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.642077 systemd[1]: Finished modprobe@dm_mod.service. May 13 00:47:03.644419 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 00:47:03.644495 systemd[1]: Finished modprobe@loop.service. May 13 00:47:03.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.644784 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 00:47:03.644854 systemd[1]: Finished modprobe@drm.service. May 13 00:47:03.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.645082 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 00:47:03.647067 systemd[1]: Finished ensure-sysext.service. May 13 00:47:03.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.647309 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 00:47:03.647378 systemd[1]: Finished modprobe@efi_pstore.service. May 13 00:47:03.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.647515 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 00:47:03.648016 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 00:47:03.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:47:03.675000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 00:47:03.675000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff915f4f30 a2=420 a3=0 items=0 ppid=1194 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:47:03.675000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 00:47:03.677668 augenrules[1222]: No rules May 13 00:47:03.677681 systemd[1]: Finished audit-rules.service. May 13 00:47:03.684228 systemd[1]: Started systemd-timesyncd.service. May 13 00:47:03.684400 systemd[1]: Reached target time-set.target. May 13 00:47:03.687253 systemd-resolved[1197]: Positive Trust Anchors: May 13 00:47:03.687261 systemd-resolved[1197]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 00:47:03.687280 systemd-resolved[1197]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 00:47:03.703108 ldconfig[1092]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 00:47:03.726417 systemd-resolved[1197]: Defaulting to hostname 'linux'. May 13 00:47:03.727852 systemd[1]: Started systemd-resolved.service. May 13 00:47:03.728006 systemd[1]: Reached target network.target. May 13 00:47:03.728102 systemd[1]: Reached target nss-lookup.target. May 13 00:47:03.773741 systemd[1]: Finished ldconfig.service. May 13 00:47:03.774812 systemd[1]: Starting systemd-update-done.service... May 13 00:47:03.779714 systemd[1]: Finished systemd-update-done.service. May 13 00:47:03.779892 systemd[1]: Reached target sysinit.target. May 13 00:47:03.780068 systemd[1]: Started motdgen.path. May 13 00:47:03.780178 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 00:47:03.780374 systemd[1]: Started logrotate.timer. May 13 00:47:03.780518 systemd[1]: Started mdadm.timer. May 13 00:47:03.780648 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 00:47:03.780766 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 00:47:03.780795 systemd[1]: Reached target paths.target. May 13 00:47:03.780885 systemd[1]: Reached target timers.target. May 13 00:47:03.781157 systemd[1]: Listening on dbus.socket. May 13 00:47:03.782017 systemd[1]: Starting docker.socket... May 13 00:47:03.784253 systemd[1]: Listening on sshd.socket. May 13 00:47:03.784416 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:47:03.784661 systemd[1]: Listening on docker.socket. May 13 00:47:03.784787 systemd[1]: Reached target sockets.target. May 13 00:47:03.784876 systemd[1]: Reached target basic.target. May 13 00:47:03.784988 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:47:03.785006 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 00:47:03.785786 systemd[1]: Starting containerd.service... May 13 00:47:03.786613 systemd[1]: Starting dbus.service... May 13 00:47:03.787652 systemd[1]: Starting enable-oem-cloudinit.service... May 13 00:47:03.788892 systemd[1]: Starting extend-filesystems.service... May 13 00:47:03.789498 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 00:47:03.790352 jq[1233]: false May 13 00:47:03.791376 systemd[1]: Starting motdgen.service... May 13 00:47:03.792570 systemd[1]: Starting prepare-helm.service... May 13 00:47:03.793319 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 00:47:03.794059 systemd[1]: Starting sshd-keygen.service... May 13 00:47:03.795703 systemd[1]: Starting systemd-logind.service... May 13 00:47:03.795810 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 00:47:03.819345 jq[1243]: true May 13 00:47:03.795856 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 00:47:03.820404 tar[1247]: linux-amd64/helm May 13 00:47:03.796229 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 00:47:03.796550 systemd[1]: Starting update-engine.service... May 13 00:47:03.797277 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 00:47:03.798093 systemd[1]: Starting vmtoolsd.service... May 13 00:47:03.829257 jq[1248]: true May 13 00:47:03.799370 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 00:47:03.799478 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 00:47:03.805649 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 00:47:03.805742 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 00:47:03.814294 systemd[1]: Started vmtoolsd.service. May 13 00:47:03.839592 extend-filesystems[1234]: Found loop1 May 13 00:47:03.839592 extend-filesystems[1234]: Found sda May 13 00:47:03.839592 extend-filesystems[1234]: Found sda1 May 13 00:47:03.839592 extend-filesystems[1234]: Found sda2 May 13 00:47:03.839592 extend-filesystems[1234]: Found sda3 May 13 00:47:03.839592 extend-filesystems[1234]: Found usr May 13 00:47:03.839592 extend-filesystems[1234]: Found sda4 May 13 00:47:03.839592 extend-filesystems[1234]: Found sda6 May 13 00:47:03.839592 extend-filesystems[1234]: Found sda7 May 13 00:47:03.839592 extend-filesystems[1234]: Found sda9 May 13 00:47:03.839592 extend-filesystems[1234]: Checking size of /dev/sda9 May 13 00:47:03.838967 systemd[1]: motdgen.service: Deactivated successfully. May 13 00:47:03.839079 systemd[1]: Finished motdgen.service. May 13 00:47:03.848632 dbus-daemon[1232]: [system] SELinux support is enabled May 13 00:47:03.848725 systemd[1]: Started dbus.service. May 13 00:47:03.850019 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 00:47:03.850033 systemd[1]: Reached target system-config.target. May 13 00:47:03.850161 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 00:47:03.850171 systemd[1]: Reached target user-config.target. May 13 00:47:03.854289 extend-filesystems[1234]: Old size kept for /dev/sda9 May 13 00:47:03.854289 extend-filesystems[1234]: Found sr0 May 13 00:47:03.852306 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 00:47:03.852400 systemd[1]: Finished extend-filesystems.service. May 13 00:47:03.873241 env[1255]: time="2025-05-13T00:47:03.872829914Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 00:47:03.895842 bash[1288]: Updated "/home/core/.ssh/authorized_keys" May 13 00:47:03.896048 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 00:47:03.915171 kernel: NET: Registered PF_VSOCK protocol family May 13 00:47:03.918966 systemd-logind[1240]: Watching system buttons on /dev/input/event1 (Power Button) May 13 00:47:03.919554 systemd-logind[1240]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 00:47:03.926109 update_engine[1241]: I0513 00:47:03.923138 1241 main.cc:92] Flatcar Update Engine starting May 13 00:47:03.926777 systemd-logind[1240]: New seat seat0. May 13 00:47:03.927870 systemd[1]: Started update-engine.service. May 13 00:47:03.928255 update_engine[1241]: I0513 00:47:03.928182 1241 update_check_scheduler.cc:74] Next update check in 11m29s May 13 00:47:03.929626 systemd[1]: Started locksmithd.service. May 13 00:47:03.932739 env[1255]: time="2025-05-13T00:47:03.932708189Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 00:47:03.932816 env[1255]: time="2025-05-13T00:47:03.932804182Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 00:47:03.934484 env[1255]: time="2025-05-13T00:47:03.934434842Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 00:47:03.934484 env[1255]: time="2025-05-13T00:47:03.934459525Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.934709997Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.934723566Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.934731869Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.934737716Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.934784871Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.934949154Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.935026081Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.935035889Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.935082405Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 00:47:03.935174 env[1255]: time="2025-05-13T00:47:03.935094037Z" level=info msg="metadata content store policy set" policy=shared May 13 00:47:03.934795 systemd[1]: Started systemd-logind.service. May 13 00:47:03.938216 env[1255]: time="2025-05-13T00:47:03.938191927Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 00:47:03.938262 env[1255]: time="2025-05-13T00:47:03.938218069Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 00:47:03.938262 env[1255]: time="2025-05-13T00:47:03.938228997Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 00:47:03.938262 env[1255]: time="2025-05-13T00:47:03.938250204Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 00:47:03.938262 env[1255]: time="2025-05-13T00:47:03.938259334Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 00:47:03.938336 env[1255]: time="2025-05-13T00:47:03.938267030Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 00:47:03.938336 env[1255]: time="2025-05-13T00:47:03.938276132Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 00:47:03.938336 env[1255]: time="2025-05-13T00:47:03.938286371Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 00:47:03.938336 env[1255]: time="2025-05-13T00:47:03.938294536Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 00:47:03.938336 env[1255]: time="2025-05-13T00:47:03.938301506Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 00:47:03.938336 env[1255]: time="2025-05-13T00:47:03.938308907Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 00:47:03.938336 env[1255]: time="2025-05-13T00:47:03.938315628Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 00:47:03.938576 env[1255]: time="2025-05-13T00:47:03.938377076Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 00:47:03.938576 env[1255]: time="2025-05-13T00:47:03.938427033Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 00:47:03.940886 env[1255]: time="2025-05-13T00:47:03.940861632Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 00:47:03.940939 env[1255]: time="2025-05-13T00:47:03.940890813Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 00:47:03.940939 env[1255]: time="2025-05-13T00:47:03.940902495Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 00:47:03.940939 env[1255]: time="2025-05-13T00:47:03.940935252Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 00:47:03.940986 env[1255]: time="2025-05-13T00:47:03.940943369Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 00:47:03.940986 env[1255]: time="2025-05-13T00:47:03.940951184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 00:47:03.940986 env[1255]: time="2025-05-13T00:47:03.940957742Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 00:47:03.940986 env[1255]: time="2025-05-13T00:47:03.940964204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 00:47:03.940986 env[1255]: time="2025-05-13T00:47:03.940971479Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 00:47:03.940986 env[1255]: time="2025-05-13T00:47:03.940978475Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 00:47:03.940986 env[1255]: time="2025-05-13T00:47:03.940985032Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 00:47:03.941109 env[1255]: time="2025-05-13T00:47:03.940994559Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 00:47:03.941109 env[1255]: time="2025-05-13T00:47:03.941092847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 00:47:03.941109 env[1255]: time="2025-05-13T00:47:03.941103185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 00:47:03.941157 env[1255]: time="2025-05-13T00:47:03.941110297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 00:47:03.941157 env[1255]: time="2025-05-13T00:47:03.941117704Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 00:47:03.941157 env[1255]: time="2025-05-13T00:47:03.941128694Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 00:47:03.941157 env[1255]: time="2025-05-13T00:47:03.941134679Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 00:47:03.941157 env[1255]: time="2025-05-13T00:47:03.941144446Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 00:47:03.941232 env[1255]: time="2025-05-13T00:47:03.941166533Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 00:47:03.941316 env[1255]: time="2025-05-13T00:47:03.941282886Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 00:47:03.945107 env[1255]: time="2025-05-13T00:47:03.941324124Z" level=info msg="Connect containerd service" May 13 00:47:03.945107 env[1255]: time="2025-05-13T00:47:03.941354980Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 00:47:03.945107 env[1255]: time="2025-05-13T00:47:03.941664257Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 00:47:03.945107 env[1255]: time="2025-05-13T00:47:03.941800164Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 00:47:03.945107 env[1255]: time="2025-05-13T00:47:03.941822254Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 00:47:03.945107 env[1255]: time="2025-05-13T00:47:03.941849695Z" level=info msg="containerd successfully booted in 0.080467s" May 13 00:47:03.941896 systemd[1]: Started containerd.service. May 13 00:48:24.771480 systemd-resolved[1197]: Clock change detected. Flushing caches. May 13 00:48:24.771850 systemd-timesyncd[1199]: Contacted time server 96.231.54.40:123 (0.flatcar.pool.ntp.org). May 13 00:48:24.772088 systemd-timesyncd[1199]: Initial clock synchronization to Tue 2025-05-13 00:48:24.771243 UTC. May 13 00:48:24.780205 env[1255]: time="2025-05-13T00:48:24.779895164Z" level=info msg="Start subscribing containerd event" May 13 00:48:24.780205 env[1255]: time="2025-05-13T00:48:24.779964103Z" level=info msg="Start recovering state" May 13 00:48:24.780205 env[1255]: time="2025-05-13T00:48:24.780048400Z" level=info msg="Start event monitor" May 13 00:48:24.780205 env[1255]: time="2025-05-13T00:48:24.780069929Z" level=info msg="Start snapshots syncer" May 13 00:48:24.780205 env[1255]: time="2025-05-13T00:48:24.780087562Z" level=info msg="Start cni network conf syncer for default" May 13 00:48:24.780205 env[1255]: time="2025-05-13T00:48:24.780096929Z" level=info msg="Start streaming server" May 13 00:48:24.907481 systemd-networkd[1059]: ens192: Gained IPv6LL May 13 00:48:24.908266 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 00:48:24.908551 systemd[1]: Reached target network-online.target. May 13 00:48:25.010606 systemd[1]: Starting kubelet.service... May 13 00:48:25.055121 tar[1247]: linux-amd64/LICENSE May 13 00:48:25.055322 tar[1247]: linux-amd64/README.md May 13 00:48:25.058554 systemd[1]: Finished prepare-helm.service. May 13 00:48:25.114150 locksmithd[1293]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 00:48:25.245259 sshd_keygen[1254]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 00:48:25.259226 systemd[1]: Finished sshd-keygen.service. May 13 00:48:25.260390 systemd[1]: Starting issuegen.service... May 13 00:48:25.263467 systemd[1]: issuegen.service: Deactivated successfully. May 13 00:48:25.263559 systemd[1]: Finished issuegen.service. May 13 00:48:25.264533 systemd[1]: Starting systemd-user-sessions.service... May 13 00:48:25.269214 systemd[1]: Finished systemd-user-sessions.service. May 13 00:48:25.270064 systemd[1]: Started getty@tty1.service. May 13 00:48:25.270816 systemd[1]: Started serial-getty@ttyS0.service. May 13 00:48:25.271005 systemd[1]: Reached target getty.target. May 13 00:48:25.814368 systemd[1]: Started kubelet.service. May 13 00:48:25.814673 systemd[1]: Reached target multi-user.target. May 13 00:48:25.815620 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 00:48:25.819743 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 00:48:25.819851 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 00:48:25.820020 systemd[1]: Startup finished in 876ms (kernel) + 5.241s (initrd) + 7.211s (userspace) = 13.328s. May 13 00:48:25.845613 login[1360]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 13 00:48:25.847649 login[1361]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 13 00:48:25.856190 systemd[1]: Created slice user-500.slice. May 13 00:48:25.857001 systemd[1]: Starting user-runtime-dir@500.service... May 13 00:48:25.860360 systemd-logind[1240]: New session 2 of user core. May 13 00:48:25.863272 systemd[1]: Finished user-runtime-dir@500.service. May 13 00:48:25.864217 systemd[1]: Starting user@500.service... May 13 00:48:25.866826 (systemd)[1367]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 00:48:25.948727 systemd[1367]: Queued start job for default target default.target. May 13 00:48:25.949047 systemd[1367]: Reached target paths.target. May 13 00:48:25.949061 systemd[1367]: Reached target sockets.target. May 13 00:48:25.949069 systemd[1367]: Reached target timers.target. May 13 00:48:25.949076 systemd[1367]: Reached target basic.target. May 13 00:48:25.949107 systemd[1367]: Reached target default.target. May 13 00:48:25.949123 systemd[1367]: Startup finished in 78ms. May 13 00:48:25.949136 systemd[1]: Started user@500.service. May 13 00:48:25.949913 systemd[1]: Started session-2.scope. May 13 00:48:26.411527 kubelet[1364]: E0513 00:48:26.411504 1364 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:48:26.412653 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:48:26.412745 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:48:26.845828 login[1360]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 13 00:48:26.848003 systemd-logind[1240]: New session 1 of user core. May 13 00:48:26.848728 systemd[1]: Started session-1.scope. May 13 00:48:36.663287 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 00:48:36.663476 systemd[1]: Stopped kubelet.service. May 13 00:48:36.664698 systemd[1]: Starting kubelet.service... May 13 00:48:36.830636 systemd[1]: Started kubelet.service. May 13 00:48:36.956219 kubelet[1396]: E0513 00:48:36.956142 1396 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:48:36.959939 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:48:36.960057 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:48:47.210746 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 00:48:47.210907 systemd[1]: Stopped kubelet.service. May 13 00:48:47.212118 systemd[1]: Starting kubelet.service... May 13 00:48:47.539526 systemd[1]: Started kubelet.service. May 13 00:48:47.583190 kubelet[1406]: E0513 00:48:47.583166 1406 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:48:47.584424 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:48:47.584496 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:48:54.797761 systemd[1]: Created slice system-sshd.slice. May 13 00:48:54.798556 systemd[1]: Started sshd@0-139.178.70.103:22-147.75.109.163:51260.service. May 13 00:48:54.836088 sshd[1414]: Accepted publickey for core from 147.75.109.163 port 51260 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:48:54.836998 sshd[1414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:48:54.839722 systemd[1]: Started session-3.scope. May 13 00:48:54.840004 systemd-logind[1240]: New session 3 of user core. May 13 00:48:54.886483 systemd[1]: Started sshd@1-139.178.70.103:22-147.75.109.163:51266.service. May 13 00:48:54.915317 sshd[1419]: Accepted publickey for core from 147.75.109.163 port 51266 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:48:54.916433 sshd[1419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:48:54.919600 systemd[1]: Started session-4.scope. May 13 00:48:54.919896 systemd-logind[1240]: New session 4 of user core. May 13 00:48:54.968846 sshd[1419]: pam_unix(sshd:session): session closed for user core May 13 00:48:54.970636 systemd[1]: Started sshd@2-139.178.70.103:22-147.75.109.163:51274.service. May 13 00:48:54.972105 systemd[1]: sshd@1-139.178.70.103:22-147.75.109.163:51266.service: Deactivated successfully. May 13 00:48:54.972464 systemd[1]: session-4.scope: Deactivated successfully. May 13 00:48:54.973547 systemd-logind[1240]: Session 4 logged out. Waiting for processes to exit. May 13 00:48:54.973999 systemd-logind[1240]: Removed session 4. May 13 00:48:54.997304 sshd[1424]: Accepted publickey for core from 147.75.109.163 port 51274 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:48:54.998078 sshd[1424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:48:55.000772 systemd[1]: Started session-5.scope. May 13 00:48:55.000976 systemd-logind[1240]: New session 5 of user core. May 13 00:48:55.049316 sshd[1424]: pam_unix(sshd:session): session closed for user core May 13 00:48:55.051692 systemd[1]: Started sshd@3-139.178.70.103:22-147.75.109.163:51288.service. May 13 00:48:55.052348 systemd[1]: sshd@2-139.178.70.103:22-147.75.109.163:51274.service: Deactivated successfully. May 13 00:48:55.052838 systemd[1]: session-5.scope: Deactivated successfully. May 13 00:48:55.053626 systemd-logind[1240]: Session 5 logged out. Waiting for processes to exit. May 13 00:48:55.054413 systemd-logind[1240]: Removed session 5. May 13 00:48:55.081936 sshd[1430]: Accepted publickey for core from 147.75.109.163 port 51288 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:48:55.082972 sshd[1430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:48:55.085993 systemd-logind[1240]: New session 6 of user core. May 13 00:48:55.086485 systemd[1]: Started session-6.scope. May 13 00:48:55.138439 sshd[1430]: pam_unix(sshd:session): session closed for user core May 13 00:48:55.140676 systemd[1]: Started sshd@4-139.178.70.103:22-147.75.109.163:51302.service. May 13 00:48:55.144539 systemd[1]: sshd@3-139.178.70.103:22-147.75.109.163:51288.service: Deactivated successfully. May 13 00:48:55.144991 systemd[1]: session-6.scope: Deactivated successfully. May 13 00:48:55.145812 systemd-logind[1240]: Session 6 logged out. Waiting for processes to exit. May 13 00:48:55.146342 systemd-logind[1240]: Removed session 6. May 13 00:48:55.170829 sshd[1436]: Accepted publickey for core from 147.75.109.163 port 51302 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:48:55.171610 sshd[1436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:48:55.174868 systemd[1]: Started session-7.scope. May 13 00:48:55.175189 systemd-logind[1240]: New session 7 of user core. May 13 00:48:55.234524 sudo[1440]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 00:48:55.234677 sudo[1440]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:48:55.245603 dbus-daemon[1232]: \xd0Mb#QV: received setenforce notice (enforcing=2132908272) May 13 00:48:55.245725 sudo[1440]: pam_unix(sudo:session): session closed for user root May 13 00:48:55.252662 sshd[1436]: pam_unix(sshd:session): session closed for user core May 13 00:48:55.255262 systemd[1]: sshd@4-139.178.70.103:22-147.75.109.163:51302.service: Deactivated successfully. May 13 00:48:55.255731 systemd[1]: session-7.scope: Deactivated successfully. May 13 00:48:55.256199 systemd-logind[1240]: Session 7 logged out. Waiting for processes to exit. May 13 00:48:55.256967 systemd[1]: Started sshd@5-139.178.70.103:22-147.75.109.163:51308.service. May 13 00:48:55.257674 systemd-logind[1240]: Removed session 7. May 13 00:48:55.286389 sshd[1444]: Accepted publickey for core from 147.75.109.163 port 51308 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:48:55.287602 sshd[1444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:48:55.290719 systemd-logind[1240]: New session 8 of user core. May 13 00:48:55.291240 systemd[1]: Started session-8.scope. May 13 00:48:55.342228 sudo[1448]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 00:48:55.342962 sudo[1448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:48:55.345222 sudo[1448]: pam_unix(sudo:session): session closed for user root May 13 00:48:55.348779 sudo[1447]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 00:48:55.348959 sudo[1447]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:48:55.355844 systemd[1]: Stopping audit-rules.service... May 13 00:48:55.358364 kernel: kauditd_printk_skb: 173 callbacks suppressed May 13 00:48:55.358416 kernel: audit: type=1305 audit(1747097335.356:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:48:55.356000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 00:48:55.356000 audit[1451]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffffa88d310 a2=420 a3=0 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.360530 auditctl[1451]: No rules May 13 00:48:55.364973 kernel: audit: type=1300 audit(1747097335.356:201): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffffa88d310 a2=420 a3=0 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.365138 systemd[1]: audit-rules.service: Deactivated successfully. May 13 00:48:55.365270 systemd[1]: Stopped audit-rules.service. May 13 00:48:55.366567 systemd[1]: Starting audit-rules.service... May 13 00:48:55.356000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 00:48:55.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:55.371522 kernel: audit: type=1327 audit(1747097335.356:201): proctitle=2F7362696E2F617564697463746C002D44 May 13 00:48:55.371551 kernel: audit: type=1131 audit(1747097335.364:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:55.379618 augenrules[1468]: No rules May 13 00:48:55.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:55.380678 sudo[1447]: pam_unix(sudo:session): session closed for user root May 13 00:48:55.379980 systemd[1]: Finished audit-rules.service. May 13 00:48:55.380000 audit[1447]: USER_END pid=1447 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:48:55.385144 systemd[1]: Started sshd@6-139.178.70.103:22-147.75.109.163:51322.service. May 13 00:48:55.385808 kernel: audit: type=1130 audit(1747097335.379:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:55.385836 kernel: audit: type=1106 audit(1747097335.380:204): pid=1447 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:48:55.380000 audit[1447]: CRED_DISP pid=1447 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:48:55.387502 sshd[1444]: pam_unix(sshd:session): session closed for user core May 13 00:48:55.389414 kernel: audit: type=1104 audit(1747097335.380:205): pid=1447 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:48:55.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-147.75.109.163:51322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:55.393351 kernel: audit: type=1130 audit(1747097335.384:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-147.75.109.163:51322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:55.393000 audit[1444]: USER_END pid=1444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:48:55.394159 systemd[1]: sshd@5-139.178.70.103:22-147.75.109.163:51308.service: Deactivated successfully. May 13 00:48:55.394536 systemd[1]: session-8.scope: Deactivated successfully. May 13 00:48:55.397344 kernel: audit: type=1106 audit(1747097335.393:207): pid=1444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:48:55.397772 systemd-logind[1240]: Session 8 logged out. Waiting for processes to exit. May 13 00:48:55.398290 systemd-logind[1240]: Removed session 8. May 13 00:48:55.393000 audit[1444]: CRED_DISP pid=1444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:48:55.402378 kernel: audit: type=1104 audit(1747097335.393:208): pid=1444 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:48:55.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.103:22-147.75.109.163:51308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:55.419171 sshd[1473]: Accepted publickey for core from 147.75.109.163 port 51322 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:48:55.418000 audit[1473]: USER_ACCT pid=1473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:48:55.420064 sshd[1473]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:48:55.419000 audit[1473]: CRED_ACQ pid=1473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:48:55.419000 audit[1473]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef0b9b120 a2=3 a3=0 items=0 ppid=1 pid=1473 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:48:55.422788 systemd[1]: Started session-9.scope. May 13 00:48:55.422996 systemd-logind[1240]: New session 9 of user core. May 13 00:48:55.425000 audit[1473]: USER_START pid=1473 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:48:55.426000 audit[1476]: CRED_ACQ pid=1476 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:48:55.471000 audit[1477]: USER_ACCT pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:48:55.472031 sudo[1477]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 00:48:55.471000 audit[1477]: CRED_REFR pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:48:55.472165 sudo[1477]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 00:48:55.472000 audit[1477]: USER_START pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:48:55.485637 systemd[1]: Starting docker.service... May 13 00:48:55.506400 env[1487]: time="2025-05-13T00:48:55.506374195Z" level=info msg="Starting up" May 13 00:48:55.507326 env[1487]: time="2025-05-13T00:48:55.507310889Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:48:55.507326 env[1487]: time="2025-05-13T00:48:55.507323456Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:48:55.507389 env[1487]: time="2025-05-13T00:48:55.507377247Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:48:55.507389 env[1487]: time="2025-05-13T00:48:55.507385067Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:48:55.508319 env[1487]: time="2025-05-13T00:48:55.508304395Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 13 00:48:55.508319 env[1487]: time="2025-05-13T00:48:55.508316183Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 13 00:48:55.508381 env[1487]: time="2025-05-13T00:48:55.508325102Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 13 00:48:55.508653 env[1487]: time="2025-05-13T00:48:55.508471727Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 13 00:48:55.512827 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport171126724-merged.mount: Deactivated successfully. May 13 00:48:55.526166 env[1487]: time="2025-05-13T00:48:55.526154167Z" level=info msg="Loading containers: start." May 13 00:48:55.566000 audit[1518]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.566000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd8aa715f0 a2=0 a3=7ffd8aa715dc items=0 ppid=1487 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.566000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 13 00:48:55.567000 audit[1520]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.567000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffda341d500 a2=0 a3=7ffda341d4ec items=0 ppid=1487 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.567000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 13 00:48:55.569000 audit[1522]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.569000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffce95c40f0 a2=0 a3=7ffce95c40dc items=0 ppid=1487 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.569000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:48:55.570000 audit[1524]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.570000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdda6950d0 a2=0 a3=7ffdda6950bc items=0 ppid=1487 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:48:55.571000 audit[1526]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.571000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6ebfcd00 a2=0 a3=7ffe6ebfccec items=0 ppid=1487 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.571000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 13 00:48:55.584000 audit[1531]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.584000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeefc3cb10 a2=0 a3=7ffeefc3cafc items=0 ppid=1487 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.584000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 13 00:48:55.587000 audit[1533]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.587000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff24946e30 a2=0 a3=7fff24946e1c items=0 ppid=1487 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.587000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 13 00:48:55.588000 audit[1535]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.588000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff17f3fd20 a2=0 a3=7fff17f3fd0c items=0 ppid=1487 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 13 00:48:55.589000 audit[1537]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.589000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffa86c5ab0 a2=0 a3=7fffa86c5a9c items=0 ppid=1487 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.589000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:48:55.593000 audit[1541]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.593000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff5a044f20 a2=0 a3=7fff5a044f0c items=0 ppid=1487 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:48:55.597000 audit[1542]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.597000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffde00c71b0 a2=0 a3=7ffde00c719c items=0 ppid=1487 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.597000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:48:55.604345 kernel: Initializing XFRM netlink socket May 13 00:48:55.626835 env[1487]: time="2025-05-13T00:48:55.626816821Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 13 00:48:55.641000 audit[1550]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.641000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffe3ed12b0 a2=0 a3=7fffe3ed129c items=0 ppid=1487 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 13 00:48:55.649000 audit[1553]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.649000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff24ec8d90 a2=0 a3=7fff24ec8d7c items=0 ppid=1487 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 13 00:48:55.651000 audit[1556]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.651000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffffb28b30 a2=0 a3=7fffffb28b1c items=0 ppid=1487 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.651000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 13 00:48:55.652000 audit[1558]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.652000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff342cee50 a2=0 a3=7fff342cee3c items=0 ppid=1487 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 13 00:48:55.653000 audit[1560]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1560 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.653000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe164701b0 a2=0 a3=7ffe1647019c items=0 ppid=1487 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 13 00:48:55.655000 audit[1562]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.655000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffeb69b8620 a2=0 a3=7ffeb69b860c items=0 ppid=1487 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 13 00:48:55.656000 audit[1564]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.656000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffe08748c0 a2=0 a3=7fffe08748ac items=0 ppid=1487 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.656000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 13 00:48:55.661000 audit[1567]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.661000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff359b74f0 a2=0 a3=7fff359b74dc items=0 ppid=1487 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 13 00:48:55.663000 audit[1569]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.663000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff81c9cbd0 a2=0 a3=7fff81c9cbbc items=0 ppid=1487 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 13 00:48:55.664000 audit[1571]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.664000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd43422820 a2=0 a3=7ffd4342280c items=0 ppid=1487 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 13 00:48:55.665000 audit[1573]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.665000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc1ae5a3f0 a2=0 a3=7ffc1ae5a3dc items=0 ppid=1487 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.665000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 13 00:48:55.666138 systemd-networkd[1059]: docker0: Link UP May 13 00:48:55.669000 audit[1577]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.669000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda2ece240 a2=0 a3=7ffda2ece22c items=0 ppid=1487 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.669000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 13 00:48:55.673000 audit[1578]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:48:55.673000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffca7d6b7c0 a2=0 a3=7ffca7d6b7ac items=0 ppid=1487 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:48:55.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 13 00:48:55.674156 env[1487]: time="2025-05-13T00:48:55.674136958Z" level=info msg="Loading containers: done." May 13 00:48:55.680181 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck620369752-merged.mount: Deactivated successfully. May 13 00:48:55.685021 env[1487]: time="2025-05-13T00:48:55.685002724Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 13 00:48:55.685183 env[1487]: time="2025-05-13T00:48:55.685171813Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 13 00:48:55.685269 env[1487]: time="2025-05-13T00:48:55.685260447Z" level=info msg="Daemon has completed initialization" May 13 00:48:55.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:55.692389 systemd[1]: Started docker.service. May 13 00:48:55.696651 env[1487]: time="2025-05-13T00:48:55.696618869Z" level=info msg="API listen on /run/docker.sock" May 13 00:48:56.561073 env[1255]: time="2025-05-13T00:48:56.561036859Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 13 00:48:57.157863 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1874901362.mount: Deactivated successfully. May 13 00:48:57.664353 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 13 00:48:57.664492 systemd[1]: Stopped kubelet.service. May 13 00:48:57.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:57.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:57.665851 systemd[1]: Starting kubelet.service... May 13 00:48:57.734948 systemd[1]: Started kubelet.service. May 13 00:48:57.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:48:57.787786 kubelet[1621]: E0513 00:48:57.787753 1621 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:48:57.789175 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:48:57.789290 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:48:57.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:48:58.837710 env[1255]: time="2025-05-13T00:48:58.837683128Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:48:58.838504 env[1255]: time="2025-05-13T00:48:58.838486936Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:48:58.839522 env[1255]: time="2025-05-13T00:48:58.839507092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:48:58.840515 env[1255]: time="2025-05-13T00:48:58.840502813Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:48:58.840953 env[1255]: time="2025-05-13T00:48:58.840936160Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 13 00:48:58.847971 env[1255]: time="2025-05-13T00:48:58.847953093Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 13 00:49:00.689063 env[1255]: time="2025-05-13T00:49:00.689031469Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:00.703406 env[1255]: time="2025-05-13T00:49:00.702670689Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:00.710187 env[1255]: time="2025-05-13T00:49:00.710164590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:00.718393 env[1255]: time="2025-05-13T00:49:00.718368802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:00.719627 env[1255]: time="2025-05-13T00:49:00.718878352Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 13 00:49:00.726978 env[1255]: time="2025-05-13T00:49:00.726945363Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 13 00:49:01.836263 env[1255]: time="2025-05-13T00:49:01.836235129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:01.838748 env[1255]: time="2025-05-13T00:49:01.838734330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:01.840255 env[1255]: time="2025-05-13T00:49:01.840242933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:01.841367 env[1255]: time="2025-05-13T00:49:01.841354467Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:01.841843 env[1255]: time="2025-05-13T00:49:01.841829606Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 13 00:49:01.847647 env[1255]: time="2025-05-13T00:49:01.847621688Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 13 00:49:03.074976 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2974322743.mount: Deactivated successfully. May 13 00:49:03.598126 env[1255]: time="2025-05-13T00:49:03.598088917Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:03.619477 env[1255]: time="2025-05-13T00:49:03.619452288Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:03.631183 env[1255]: time="2025-05-13T00:49:03.631162800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:03.640125 env[1255]: time="2025-05-13T00:49:03.640103813Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:03.640512 env[1255]: time="2025-05-13T00:49:03.640492281Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 13 00:49:03.646863 env[1255]: time="2025-05-13T00:49:03.646846136Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 13 00:49:04.234817 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2802953660.mount: Deactivated successfully. May 13 00:49:05.046514 env[1255]: time="2025-05-13T00:49:05.046459048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:05.047367 env[1255]: time="2025-05-13T00:49:05.047352260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:05.051773 env[1255]: time="2025-05-13T00:49:05.051758480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:05.056669 env[1255]: time="2025-05-13T00:49:05.056652402Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:05.057113 env[1255]: time="2025-05-13T00:49:05.057096875Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 13 00:49:05.062539 env[1255]: time="2025-05-13T00:49:05.062514603Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 13 00:49:05.751297 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount792079268.mount: Deactivated successfully. May 13 00:49:05.755350 env[1255]: time="2025-05-13T00:49:05.755307292Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:05.755772 env[1255]: time="2025-05-13T00:49:05.755756278Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:05.756624 env[1255]: time="2025-05-13T00:49:05.756612337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:05.757251 env[1255]: time="2025-05-13T00:49:05.757237550Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:05.757615 env[1255]: time="2025-05-13T00:49:05.757600970Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 13 00:49:05.762938 env[1255]: time="2025-05-13T00:49:05.762920138Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 13 00:49:06.374585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1903092782.mount: Deactivated successfully. May 13 00:49:07.914309 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 13 00:49:07.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:07.914434 systemd[1]: Stopped kubelet.service. May 13 00:49:07.915389 systemd[1]: Starting kubelet.service... May 13 00:49:07.917496 kernel: kauditd_printk_skb: 88 callbacks suppressed May 13 00:49:07.917528 kernel: audit: type=1130 audit(1747097347.913:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:07.917545 kernel: audit: type=1131 audit(1747097347.913:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:07.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:09.038728 env[1255]: time="2025-05-13T00:49:09.038671890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:09.058354 env[1255]: time="2025-05-13T00:49:09.058305393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:09.061193 env[1255]: time="2025-05-13T00:49:09.060670863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:09.067661 env[1255]: time="2025-05-13T00:49:09.067633326Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:09.068614 env[1255]: time="2025-05-13T00:49:09.068594032Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 13 00:49:09.585244 systemd[1]: Started kubelet.service. May 13 00:49:09.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:09.589570 kernel: audit: type=1130 audit(1747097349.584:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:09.661485 kubelet[1683]: E0513 00:49:09.661456 1683 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 00:49:09.662594 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 00:49:09.662666 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 00:49:09.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:49:09.666356 kernel: audit: type=1131 audit(1747097349.661:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:49:10.506602 update_engine[1241]: I0513 00:49:10.506366 1241 update_attempter.cc:509] Updating boot flags... May 13 00:49:11.111243 systemd[1]: Stopped kubelet.service. May 13 00:49:11.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:11.113071 systemd[1]: Starting kubelet.service... May 13 00:49:11.115650 kernel: audit: type=1130 audit(1747097351.109:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:11.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:11.118347 kernel: audit: type=1131 audit(1747097351.110:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:11.127428 systemd[1]: Reloading. May 13 00:49:11.192849 /usr/lib/systemd/system-generators/torcx-generator[1772]: time="2025-05-13T00:49:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:49:11.192867 /usr/lib/systemd/system-generators/torcx-generator[1772]: time="2025-05-13T00:49:11Z" level=info msg="torcx already run" May 13 00:49:11.247972 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:49:11.248088 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:49:11.259870 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:49:11.305580 kernel: audit: type=1400 audit(1747097351.299:253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305651 kernel: audit: type=1400 audit(1747097351.299:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.308095 kernel: audit: type=1400 audit(1747097351.302:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310545 kernel: audit: type=1400 audit(1747097351.302:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit: BPF prog-id=40 op=LOAD May 13 00:49:11.305000 audit: BPF prog-id=38 op=UNLOAD May 13 00:49:11.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit: BPF prog-id=41 op=LOAD May 13 00:49:11.307000 audit: BPF prog-id=24 op=UNLOAD May 13 00:49:11.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit: BPF prog-id=42 op=LOAD May 13 00:49:11.310000 audit: BPF prog-id=34 op=UNLOAD May 13 00:49:11.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit: BPF prog-id=43 op=LOAD May 13 00:49:11.311000 audit: BPF prog-id=35 op=UNLOAD May 13 00:49:11.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit: BPF prog-id=44 op=LOAD May 13 00:49:11.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit: BPF prog-id=45 op=LOAD May 13 00:49:11.312000 audit: BPF prog-id=36 op=UNLOAD May 13 00:49:11.312000 audit: BPF prog-id=37 op=UNLOAD May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit: BPF prog-id=46 op=LOAD May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.312000 audit: BPF prog-id=47 op=LOAD May 13 00:49:11.312000 audit: BPF prog-id=25 op=UNLOAD May 13 00:49:11.312000 audit: BPF prog-id=26 op=UNLOAD May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit: BPF prog-id=48 op=LOAD May 13 00:49:11.313000 audit: BPF prog-id=27 op=UNLOAD May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit: BPF prog-id=49 op=LOAD May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.313000 audit: BPF prog-id=50 op=LOAD May 13 00:49:11.313000 audit: BPF prog-id=28 op=UNLOAD May 13 00:49:11.313000 audit: BPF prog-id=29 op=UNLOAD May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit: BPF prog-id=51 op=LOAD May 13 00:49:11.314000 audit: BPF prog-id=33 op=UNLOAD May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit: BPF prog-id=52 op=LOAD May 13 00:49:11.314000 audit: BPF prog-id=30 op=UNLOAD May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit: BPF prog-id=53 op=LOAD May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:11.314000 audit: BPF prog-id=54 op=LOAD May 13 00:49:11.314000 audit: BPF prog-id=31 op=UNLOAD May 13 00:49:11.314000 audit: BPF prog-id=32 op=UNLOAD May 13 00:49:11.325430 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 13 00:49:11.325486 systemd[1]: kubelet.service: Failed with result 'signal'. May 13 00:49:11.325604 systemd[1]: Stopped kubelet.service. May 13 00:49:11.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 00:49:11.326835 systemd[1]: Starting kubelet.service... May 13 00:49:12.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:12.250576 systemd[1]: Started kubelet.service. May 13 00:49:12.399225 kubelet[1836]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:49:12.399467 kubelet[1836]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:49:12.399510 kubelet[1836]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:49:12.399591 kubelet[1836]: I0513 00:49:12.399574 1836 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:49:12.660800 kubelet[1836]: I0513 00:49:12.660583 1836 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 13 00:49:12.660896 kubelet[1836]: I0513 00:49:12.660888 1836 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:49:12.661160 kubelet[1836]: I0513 00:49:12.661150 1836 server.go:927] "Client rotation is on, will bootstrap in background" May 13 00:49:12.672595 kubelet[1836]: I0513 00:49:12.672548 1836 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:49:12.673055 kubelet[1836]: E0513 00:49:12.673008 1836 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.103:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.680969 kubelet[1836]: I0513 00:49:12.680949 1836 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:49:12.681220 kubelet[1836]: I0513 00:49:12.681197 1836 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:49:12.681415 kubelet[1836]: I0513 00:49:12.681276 1836 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 13 00:49:12.681553 kubelet[1836]: I0513 00:49:12.681544 1836 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:49:12.681605 kubelet[1836]: I0513 00:49:12.681598 1836 container_manager_linux.go:301] "Creating device plugin manager" May 13 00:49:12.681721 kubelet[1836]: I0513 00:49:12.681713 1836 state_mem.go:36] "Initialized new in-memory state store" May 13 00:49:12.682530 kubelet[1836]: I0513 00:49:12.682519 1836 kubelet.go:400] "Attempting to sync node with API server" May 13 00:49:12.682603 kubelet[1836]: I0513 00:49:12.682595 1836 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:49:12.682670 kubelet[1836]: I0513 00:49:12.682663 1836 kubelet.go:312] "Adding apiserver pod source" May 13 00:49:12.682774 kubelet[1836]: I0513 00:49:12.682719 1836 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:49:12.698417 kubelet[1836]: W0513 00:49:12.698247 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.103:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.698417 kubelet[1836]: E0513 00:49:12.698297 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.103:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.698595 kubelet[1836]: W0513 00:49:12.698570 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.103:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.698629 kubelet[1836]: E0513 00:49:12.698600 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.103:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.698671 kubelet[1836]: I0513 00:49:12.698658 1836 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:49:12.699961 kubelet[1836]: I0513 00:49:12.699936 1836 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:49:12.700007 kubelet[1836]: W0513 00:49:12.699982 1836 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 00:49:12.700950 kubelet[1836]: I0513 00:49:12.700611 1836 server.go:1264] "Started kubelet" May 13 00:49:12.717755 kubelet[1836]: I0513 00:49:12.717727 1836 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:49:12.718527 kubelet[1836]: I0513 00:49:12.718518 1836 server.go:455] "Adding debug handlers to kubelet server" May 13 00:49:12.724602 kubelet[1836]: I0513 00:49:12.724572 1836 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:49:12.724728 kubelet[1836]: I0513 00:49:12.724717 1836 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:49:12.724826 kubelet[1836]: I0513 00:49:12.724818 1836 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:49:12.723000 audit[1836]: AVC avc: denied { mac_admin } for pid=1836 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:12.723000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:49:12.723000 audit[1836]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb20c0 a1=c000ae4f78 a2=c000bb2090 a3=25 items=0 ppid=1 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:49:12.723000 audit[1836]: AVC avc: denied { mac_admin } for pid=1836 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:12.723000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:49:12.723000 audit[1836]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b78400 a1=c000ae4f90 a2=c000bb2150 a3=25 items=0 ppid=1 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:49:12.725118 kubelet[1836]: I0513 00:49:12.724981 1836 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:49:12.725184 kubelet[1836]: I0513 00:49:12.725171 1836 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:49:12.726640 kubelet[1836]: E0513 00:49:12.726537 1836 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.103:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.103:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183eefc927be780d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-13 00:49:12.700590093 +0000 UTC m=+0.447003229,LastTimestamp:2025-05-13 00:49:12.700590093 +0000 UTC m=+0.447003229,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 13 00:49:12.730852 kubelet[1836]: I0513 00:49:12.730824 1836 volume_manager.go:291] "Starting Kubelet Volume Manager" May 13 00:49:12.731759 kubelet[1836]: I0513 00:49:12.731739 1836 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:49:12.731827 kubelet[1836]: I0513 00:49:12.731815 1836 reconciler.go:26] "Reconciler: start to sync state" May 13 00:49:12.732706 kubelet[1836]: W0513 00:49:12.732548 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.732706 kubelet[1836]: E0513 00:49:12.732595 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.732706 kubelet[1836]: E0513 00:49:12.732650 1836 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.103:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.103:6443: connect: connection refused" interval="200ms" May 13 00:49:12.733081 kubelet[1836]: I0513 00:49:12.733064 1836 factory.go:221] Registration of the systemd container factory successfully May 13 00:49:12.733165 kubelet[1836]: I0513 00:49:12.733149 1836 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:49:12.732000 audit[1848]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1848 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:12.732000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf3935450 a2=0 a3=7ffdf393543c items=0 ppid=1836 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:49:12.735352 kubelet[1836]: I0513 00:49:12.735323 1836 factory.go:221] Registration of the containerd container factory successfully May 13 00:49:12.742199 kubelet[1836]: E0513 00:49:12.742175 1836 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:49:12.746000 audit[1849]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:12.746000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6f7fef40 a2=0 a3=7fff6f7fef2c items=0 ppid=1836 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:49:12.749000 audit[1851]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:12.749000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd06672cb0 a2=0 a3=7ffd06672c9c items=0 ppid=1836 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:49:12.751000 audit[1853]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:12.751000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdc4828890 a2=0 a3=7ffdc482887c items=0 ppid=1836 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:49:12.757909 kubelet[1836]: I0513 00:49:12.757893 1836 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:49:12.758039 kubelet[1836]: I0513 00:49:12.758031 1836 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:49:12.758099 kubelet[1836]: I0513 00:49:12.758087 1836 state_mem.go:36] "Initialized new in-memory state store" May 13 00:49:12.759173 kubelet[1836]: I0513 00:49:12.759165 1836 policy_none.go:49] "None policy: Start" May 13 00:49:12.759622 kubelet[1836]: I0513 00:49:12.759614 1836 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:49:12.759697 kubelet[1836]: I0513 00:49:12.759690 1836 state_mem.go:35] "Initializing new in-memory state store" May 13 00:49:12.763364 systemd[1]: Created slice kubepods.slice. May 13 00:49:12.765000 audit[1858]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:12.765000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd5e589740 a2=0 a3=7ffd5e58972c items=0 ppid=1836 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 00:49:12.766705 systemd[1]: Created slice kubepods-burstable.slice. May 13 00:49:12.767675 kubelet[1836]: I0513 00:49:12.767657 1836 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:49:12.767000 audit[1860]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:12.767000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdff362770 a2=0 a3=7ffdff36275c items=0 ppid=1836 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:49:12.768000 audit[1861]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:12.768000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd2decf00 a2=0 a3=7fffd2deceec items=0 ppid=1836 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:49:12.769854 systemd[1]: Created slice kubepods-besteffort.slice. May 13 00:49:12.768000 audit[1862]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:12.768000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef3d61620 a2=0 a3=7ffef3d6160c items=0 ppid=1836 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:49:12.770000 audit[1859]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:12.770000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffef392ea0 a2=0 a3=7fffef392e8c items=0 ppid=1836 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 00:49:12.771778 kubelet[1836]: I0513 00:49:12.771764 1836 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:49:12.771857 kubelet[1836]: I0513 00:49:12.771849 1836 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:49:12.771915 kubelet[1836]: I0513 00:49:12.771908 1836 kubelet.go:2337] "Starting kubelet main sync loop" May 13 00:49:12.772002 kubelet[1836]: E0513 00:49:12.771981 1836 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:49:12.772530 kubelet[1836]: W0513 00:49:12.772477 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.772530 kubelet[1836]: E0513 00:49:12.772504 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:12.771000 audit[1863]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:12.771000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff74ddf190 a2=0 a3=7fff74ddf17c items=0 ppid=1836 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 00:49:12.772000 audit[1864]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:12.772000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd6f6521e0 a2=0 a3=7ffd6f6521cc items=0 ppid=1836 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 00:49:12.774176 kubelet[1836]: I0513 00:49:12.774158 1836 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:49:12.772000 audit[1836]: AVC avc: denied { mac_admin } for pid=1836 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:12.772000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:49:12.772000 audit[1836]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000947200 a1=c000a1e468 a2=c0009471d0 a3=25 items=0 ppid=1 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.772000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:49:12.774319 kubelet[1836]: I0513 00:49:12.774204 1836 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:49:12.774319 kubelet[1836]: I0513 00:49:12.774281 1836 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:49:12.774381 kubelet[1836]: I0513 00:49:12.774376 1836 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:49:12.774000 audit[1865]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:12.774000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe264eee70 a2=0 a3=7ffe264eee5c items=0 ppid=1836 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:12.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 00:49:12.776541 kubelet[1836]: E0513 00:49:12.776514 1836 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 13 00:49:12.831877 kubelet[1836]: I0513 00:49:12.831855 1836 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:49:12.832083 kubelet[1836]: E0513 00:49:12.832070 1836 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.103:6443/api/v1/nodes\": dial tcp 139.178.70.103:6443: connect: connection refused" node="localhost" May 13 00:49:12.872522 kubelet[1836]: I0513 00:49:12.872432 1836 topology_manager.go:215] "Topology Admit Handler" podUID="5fb90cafdd82145cf4a0ef2a99c4666d" podNamespace="kube-system" podName="kube-apiserver-localhost" May 13 00:49:12.873260 kubelet[1836]: I0513 00:49:12.873249 1836 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 13 00:49:12.873801 kubelet[1836]: I0513 00:49:12.873791 1836 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 13 00:49:12.877817 systemd[1]: Created slice kubepods-burstable-pod5fb90cafdd82145cf4a0ef2a99c4666d.slice. May 13 00:49:12.885070 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 13 00:49:12.892621 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 13 00:49:12.933483 kubelet[1836]: E0513 00:49:12.933434 1836 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.103:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.103:6443: connect: connection refused" interval="400ms" May 13 00:49:13.032671 kubelet[1836]: I0513 00:49:13.032646 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:13.032671 kubelet[1836]: I0513 00:49:13.032674 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 13 00:49:13.032781 kubelet[1836]: I0513 00:49:13.032687 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5fb90cafdd82145cf4a0ef2a99c4666d-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5fb90cafdd82145cf4a0ef2a99c4666d\") " pod="kube-system/kube-apiserver-localhost" May 13 00:49:13.032781 kubelet[1836]: I0513 00:49:13.032697 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5fb90cafdd82145cf4a0ef2a99c4666d-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5fb90cafdd82145cf4a0ef2a99c4666d\") " pod="kube-system/kube-apiserver-localhost" May 13 00:49:13.032781 kubelet[1836]: I0513 00:49:13.032768 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:13.032838 kubelet[1836]: I0513 00:49:13.032802 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:13.032838 kubelet[1836]: I0513 00:49:13.032813 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:13.032838 kubelet[1836]: I0513 00:49:13.032822 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:13.032838 kubelet[1836]: I0513 00:49:13.032830 1836 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5fb90cafdd82145cf4a0ef2a99c4666d-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5fb90cafdd82145cf4a0ef2a99c4666d\") " pod="kube-system/kube-apiserver-localhost" May 13 00:49:13.033595 kubelet[1836]: I0513 00:49:13.033567 1836 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:49:13.033769 kubelet[1836]: E0513 00:49:13.033755 1836 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.103:6443/api/v1/nodes\": dial tcp 139.178.70.103:6443: connect: connection refused" node="localhost" May 13 00:49:13.184446 env[1255]: time="2025-05-13T00:49:13.184111446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5fb90cafdd82145cf4a0ef2a99c4666d,Namespace:kube-system,Attempt:0,}" May 13 00:49:13.192131 env[1255]: time="2025-05-13T00:49:13.191961260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 13 00:49:13.194236 env[1255]: time="2025-05-13T00:49:13.194194242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 13 00:49:13.334446 kubelet[1836]: E0513 00:49:13.334421 1836 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.103:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.103:6443: connect: connection refused" interval="800ms" May 13 00:49:13.434797 kubelet[1836]: I0513 00:49:13.434640 1836 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:49:13.435194 kubelet[1836]: E0513 00:49:13.435171 1836 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.103:6443/api/v1/nodes\": dial tcp 139.178.70.103:6443: connect: connection refused" node="localhost" May 13 00:49:13.669682 kubelet[1836]: W0513 00:49:13.669657 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:13.669996 kubelet[1836]: E0513 00:49:13.669983 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:13.715837 kubelet[1836]: W0513 00:49:13.715597 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:13.716003 kubelet[1836]: E0513 00:49:13.715984 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:13.828099 env[1255]: time="2025-05-13T00:49:13.827321052Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.827631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2652827308.mount: Deactivated successfully. May 13 00:49:13.829968 env[1255]: time="2025-05-13T00:49:13.829942329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.830635 env[1255]: time="2025-05-13T00:49:13.830609993Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.831625 env[1255]: time="2025-05-13T00:49:13.831603938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.834397 env[1255]: time="2025-05-13T00:49:13.834380692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.835280 env[1255]: time="2025-05-13T00:49:13.835266833Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.836770 env[1255]: time="2025-05-13T00:49:13.836756403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.837326 env[1255]: time="2025-05-13T00:49:13.837314005Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.840956 env[1255]: time="2025-05-13T00:49:13.839747330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.840956 env[1255]: time="2025-05-13T00:49:13.840196240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.840956 env[1255]: time="2025-05-13T00:49:13.840655479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.844522 env[1255]: time="2025-05-13T00:49:13.844504181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:13.846370 kubelet[1836]: W0513 00:49:13.846311 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.103:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:13.846370 kubelet[1836]: E0513 00:49:13.846356 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.103:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:13.857146 env[1255]: time="2025-05-13T00:49:13.847925912Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:49:13.857146 env[1255]: time="2025-05-13T00:49:13.847959051Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:49:13.857146 env[1255]: time="2025-05-13T00:49:13.847966934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:49:13.857146 env[1255]: time="2025-05-13T00:49:13.848112717Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/467938ed85aa7fd50e202e70118595d182670d5a47757359f296719ba7e18203 pid=1874 runtime=io.containerd.runc.v2 May 13 00:49:13.877605 systemd[1]: Started cri-containerd-467938ed85aa7fd50e202e70118595d182670d5a47757359f296719ba7e18203.scope. May 13 00:49:13.893533 kernel: kauditd_printk_skb: 218 callbacks suppressed May 13 00:49:13.893609 kernel: audit: type=1400 audit(1747097353.889:442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.893628 kernel: audit: type=1400 audit(1747097353.889:443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.932878 kernel: audit: type=1400 audit(1747097353.889:444): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.932933 kernel: audit: type=1400 audit(1747097353.889:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.932960 kernel: audit: type=1400 audit(1747097353.889:446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.932984 kernel: audit: type=1400 audit(1747097353.889:447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.933001 kernel: audit: type=1400 audit(1747097353.889:448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.933014 kernel: audit: type=1400 audit(1747097353.889:449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.933035 kernel: audit: type=1400 audit(1747097353.889:450): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.933060 kernel: audit: type=1400 audit(1747097353.893:451): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.893000 audit: BPF prog-id=55 op=LOAD May 13 00:49:13.902000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1874 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:13.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373933386564383561613766643530653230326537303131383539 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1874 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:13.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373933386564383561613766643530653230326537303131383539 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.902000 audit: BPF prog-id=56 op=LOAD May 13 00:49:13.902000 audit[1886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001cd320 items=0 ppid=1874 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:13.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373933386564383561613766643530653230326537303131383539 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.909000 audit: BPF prog-id=57 op=LOAD May 13 00:49:13.909000 audit[1886]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001cd368 items=0 ppid=1874 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:13.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373933386564383561613766643530653230326537303131383539 May 13 00:49:13.914000 audit: BPF prog-id=57 op=UNLOAD May 13 00:49:13.914000 audit: BPF prog-id=56 op=UNLOAD May 13 00:49:13.914000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { perfmon } for pid=1886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit[1886]: AVC avc: denied { bpf } for pid=1886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:13.914000 audit: BPF prog-id=58 op=LOAD May 13 00:49:13.914000 audit[1886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001cd778 items=0 ppid=1874 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:13.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373933386564383561613766643530653230326537303131383539 May 13 00:49:13.937272 env[1255]: time="2025-05-13T00:49:13.937247356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"467938ed85aa7fd50e202e70118595d182670d5a47757359f296719ba7e18203\"" May 13 00:49:13.939894 env[1255]: time="2025-05-13T00:49:13.939869533Z" level=info msg="CreateContainer within sandbox \"467938ed85aa7fd50e202e70118595d182670d5a47757359f296719ba7e18203\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 13 00:49:14.024625 kubelet[1836]: W0513 00:49:14.023856 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.103:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:14.024625 kubelet[1836]: E0513 00:49:14.023919 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.103:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:14.115715 env[1255]: time="2025-05-13T00:49:14.115664111Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:49:14.115835 env[1255]: time="2025-05-13T00:49:14.115691886Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:49:14.115892 env[1255]: time="2025-05-13T00:49:14.115826090Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:49:14.116041 env[1255]: time="2025-05-13T00:49:14.116016975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d91276d7f3e8093dc3ca0960858d38bd21b6cabd3ce63d1a4864b3736f66689 pid=1921 runtime=io.containerd.runc.v2 May 13 00:49:14.123210 systemd[1]: Started cri-containerd-1d91276d7f3e8093dc3ca0960858d38bd21b6cabd3ce63d1a4864b3736f66689.scope. May 13 00:49:14.131523 env[1255]: time="2025-05-13T00:49:14.131481661Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:49:14.133050 env[1255]: time="2025-05-13T00:49:14.131510943Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:49:14.133050 env[1255]: time="2025-05-13T00:49:14.131519504Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:49:14.133050 env[1255]: time="2025-05-13T00:49:14.131618479Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/120769fcf4d67e32e52b8179d9bec7210aaff21d0a1157aae823523b62ad6a23 pid=1950 runtime=io.containerd.runc.v2 May 13 00:49:14.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.133000 audit: BPF prog-id=59 op=LOAD May 13 00:49:14.135374 kubelet[1836]: E0513 00:49:14.135348 1836 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.103:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.103:6443: connect: connection refused" interval="1.6s" May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1921 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393132373664376633653830393364633363613039363038353864 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1921 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393132373664376633653830393364633363613039363038353864 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit: BPF prog-id=60 op=LOAD May 13 00:49:14.134000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000393530 items=0 ppid=1921 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393132373664376633653830393364633363613039363038353864 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit: BPF prog-id=61 op=LOAD May 13 00:49:14.134000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000393578 items=0 ppid=1921 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393132373664376633653830393364633363613039363038353864 May 13 00:49:14.134000 audit: BPF prog-id=61 op=UNLOAD May 13 00:49:14.134000 audit: BPF prog-id=60 op=UNLOAD May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.134000 audit: BPF prog-id=62 op=LOAD May 13 00:49:14.134000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000393988 items=0 ppid=1921 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393132373664376633653830393364633363613039363038353864 May 13 00:49:14.147861 systemd[1]: Started cri-containerd-120769fcf4d67e32e52b8179d9bec7210aaff21d0a1157aae823523b62ad6a23.scope. May 13 00:49:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit: BPF prog-id=63 op=LOAD May 13 00:49:14.160000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1950 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303736396663663464363765333265353262383137396439626563 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1950 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303736396663663464363765333265353262383137396439626563 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.160000 audit: BPF prog-id=64 op=LOAD May 13 00:49:14.160000 audit[1964]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025760 items=0 ppid=1950 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303736396663663464363765333265353262383137396439626563 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit: BPF prog-id=65 op=LOAD May 13 00:49:14.161000 audit[1964]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000257a8 items=0 ppid=1950 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303736396663663464363765333265353262383137396439626563 May 13 00:49:14.161000 audit: BPF prog-id=65 op=UNLOAD May 13 00:49:14.161000 audit: BPF prog-id=64 op=UNLOAD May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { perfmon } for pid=1964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit[1964]: AVC avc: denied { bpf } for pid=1964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.161000 audit: BPF prog-id=66 op=LOAD May 13 00:49:14.161000 audit[1964]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025bb8 items=0 ppid=1950 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132303736396663663464363765333265353262383137396439626563 May 13 00:49:14.164826 env[1255]: time="2025-05-13T00:49:14.164802885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:5fb90cafdd82145cf4a0ef2a99c4666d,Namespace:kube-system,Attempt:0,} returns sandbox id \"1d91276d7f3e8093dc3ca0960858d38bd21b6cabd3ce63d1a4864b3736f66689\"" May 13 00:49:14.166461 env[1255]: time="2025-05-13T00:49:14.166448346Z" level=info msg="CreateContainer within sandbox \"1d91276d7f3e8093dc3ca0960858d38bd21b6cabd3ce63d1a4864b3736f66689\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 13 00:49:14.186768 env[1255]: time="2025-05-13T00:49:14.186740339Z" level=info msg="CreateContainer within sandbox \"467938ed85aa7fd50e202e70118595d182670d5a47757359f296719ba7e18203\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3ef8fa63a4e4d8e25ce529f272f4e7a7e70498d5d8cf8da8bfda2935f3d9fa76\"" May 13 00:49:14.187319 env[1255]: time="2025-05-13T00:49:14.187300367Z" level=info msg="StartContainer for \"3ef8fa63a4e4d8e25ce529f272f4e7a7e70498d5d8cf8da8bfda2935f3d9fa76\"" May 13 00:49:14.192022 env[1255]: time="2025-05-13T00:49:14.191990202Z" level=info msg="CreateContainer within sandbox \"1d91276d7f3e8093dc3ca0960858d38bd21b6cabd3ce63d1a4864b3736f66689\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"30f87c44a32a1d9ce0ff10423553d681e47fbff687f23d076b11dcd8b9fb4487\"" May 13 00:49:14.192491 env[1255]: time="2025-05-13T00:49:14.192468700Z" level=info msg="StartContainer for \"30f87c44a32a1d9ce0ff10423553d681e47fbff687f23d076b11dcd8b9fb4487\"" May 13 00:49:14.194099 env[1255]: time="2025-05-13T00:49:14.194068091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"120769fcf4d67e32e52b8179d9bec7210aaff21d0a1157aae823523b62ad6a23\"" May 13 00:49:14.195998 env[1255]: time="2025-05-13T00:49:14.195981147Z" level=info msg="CreateContainer within sandbox \"120769fcf4d67e32e52b8179d9bec7210aaff21d0a1157aae823523b62ad6a23\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 13 00:49:14.205941 systemd[1]: Started cri-containerd-3ef8fa63a4e4d8e25ce529f272f4e7a7e70498d5d8cf8da8bfda2935f3d9fa76.scope. May 13 00:49:14.214342 systemd[1]: Started cri-containerd-30f87c44a32a1d9ce0ff10423553d681e47fbff687f23d076b11dcd8b9fb4487.scope. May 13 00:49:14.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.215000 audit: BPF prog-id=67 op=LOAD May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1874 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663866613633613465346438653235636535323966323732663465 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1874 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663866613633613465346438653235636535323966323732663465 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit: BPF prog-id=68 op=LOAD May 13 00:49:14.216000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e1b50 items=0 ppid=1874 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663866613633613465346438653235636535323966323732663465 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit: BPF prog-id=69 op=LOAD May 13 00:49:14.216000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e1b98 items=0 ppid=1874 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663866613633613465346438653235636535323966323732663465 May 13 00:49:14.216000 audit: BPF prog-id=69 op=UNLOAD May 13 00:49:14.216000 audit: BPF prog-id=68 op=UNLOAD May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { perfmon } for pid=2014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit[2014]: AVC avc: denied { bpf } for pid=2014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.216000 audit: BPF prog-id=70 op=LOAD May 13 00:49:14.216000 audit[2014]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e1fa8 items=0 ppid=1874 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365663866613633613465346438653235636535323966323732663465 May 13 00:49:14.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.224000 audit: BPF prog-id=71 op=LOAD May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1921 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663837633434613332613164396365306666313034323335353364 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1921 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663837633434613332613164396365306666313034323335353364 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit: BPF prog-id=72 op=LOAD May 13 00:49:14.225000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c4280 items=0 ppid=1921 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663837633434613332613164396365306666313034323335353364 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit: BPF prog-id=73 op=LOAD May 13 00:49:14.225000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c42c8 items=0 ppid=1921 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663837633434613332613164396365306666313034323335353364 May 13 00:49:14.225000 audit: BPF prog-id=73 op=UNLOAD May 13 00:49:14.225000 audit: BPF prog-id=72 op=UNLOAD May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.225000 audit: BPF prog-id=74 op=LOAD May 13 00:49:14.225000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c46d8 items=0 ppid=1921 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663837633434613332613164396365306666313034323335353364 May 13 00:49:14.236666 kubelet[1836]: I0513 00:49:14.236647 1836 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:49:14.236884 kubelet[1836]: E0513 00:49:14.236868 1836 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.103:6443/api/v1/nodes\": dial tcp 139.178.70.103:6443: connect: connection refused" node="localhost" May 13 00:49:14.288314 env[1255]: time="2025-05-13T00:49:14.288244958Z" level=info msg="StartContainer for \"3ef8fa63a4e4d8e25ce529f272f4e7a7e70498d5d8cf8da8bfda2935f3d9fa76\" returns successfully" May 13 00:49:14.299515 env[1255]: time="2025-05-13T00:49:14.299493454Z" level=info msg="StartContainer for \"30f87c44a32a1d9ce0ff10423553d681e47fbff687f23d076b11dcd8b9fb4487\" returns successfully" May 13 00:49:14.327820 env[1255]: time="2025-05-13T00:49:14.327781466Z" level=info msg="CreateContainer within sandbox \"120769fcf4d67e32e52b8179d9bec7210aaff21d0a1157aae823523b62ad6a23\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"bbd8475485381138465c64fd153e731858ec5f39480b683e17921d0e26b1cd5d\"" May 13 00:49:14.328411 env[1255]: time="2025-05-13T00:49:14.328396943Z" level=info msg="StartContainer for \"bbd8475485381138465c64fd153e731858ec5f39480b683e17921d0e26b1cd5d\"" May 13 00:49:14.340961 systemd[1]: Started cri-containerd-bbd8475485381138465c64fd153e731858ec5f39480b683e17921d0e26b1cd5d.scope. May 13 00:49:14.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.356000 audit: BPF prog-id=75 op=LOAD May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1950 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643834373534383533383131333834363563363466643135336537 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1950 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643834373534383533383131333834363563363466643135336537 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit: BPF prog-id=76 op=LOAD May 13 00:49:14.357000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000296370 items=0 ppid=1950 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643834373534383533383131333834363563363466643135336537 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit: BPF prog-id=77 op=LOAD May 13 00:49:14.357000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002963b8 items=0 ppid=1950 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643834373534383533383131333834363563363466643135336537 May 13 00:49:14.357000 audit: BPF prog-id=77 op=UNLOAD May 13 00:49:14.357000 audit: BPF prog-id=76 op=UNLOAD May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:14.357000 audit: BPF prog-id=78 op=LOAD May 13 00:49:14.357000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002967c8 items=0 ppid=1950 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:14.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262643834373534383533383131333834363563363466643135336537 May 13 00:49:14.394620 env[1255]: time="2025-05-13T00:49:14.394595107Z" level=info msg="StartContainer for \"bbd8475485381138465c64fd153e731858ec5f39480b683e17921d0e26b1cd5d\" returns successfully" May 13 00:49:14.677028 kubelet[1836]: E0513 00:49:14.677000 1836 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.103:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:15.392671 kubelet[1836]: W0513 00:49:15.392591 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:15.392671 kubelet[1836]: E0513 00:49:15.392645 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.103:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:15.569725 kubelet[1836]: W0513 00:49:15.569668 1836 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:15.569725 kubelet[1836]: E0513 00:49:15.569709 1836 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.103:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.103:6443: connect: connection refused May 13 00:49:15.645000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:15.645000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000a0c020 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:49:15.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:49:15.645000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:15.645000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000570690 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:49:15.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:49:15.838246 kubelet[1836]: I0513 00:49:15.838230 1836 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:49:16.550000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:16.550000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00196a420 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:49:16.550000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:49:16.550000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:16.550000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006415080 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:49:16.550000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:49:16.550000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:16.550000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006415140 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:49:16.550000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:49:16.570000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:16.570000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=55 a1=c00803bb30 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:49:16.570000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:49:16.612000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:16.612000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c006b36480 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:49:16.612000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:49:16.613000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:16.613000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c007034a80 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:49:16.613000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:49:16.801426 kubelet[1836]: E0513 00:49:16.801365 1836 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 13 00:49:16.922434 kubelet[1836]: I0513 00:49:16.922407 1836 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 13 00:49:17.700382 kubelet[1836]: I0513 00:49:17.700359 1836 apiserver.go:52] "Watching apiserver" May 13 00:49:17.732086 kubelet[1836]: I0513 00:49:17.732066 1836 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:49:19.167752 kernel: kauditd_printk_skb: 356 callbacks suppressed May 13 00:49:19.167889 kernel: audit: type=1400 audit(1747097359.162:558): avc: denied { watch } for pid=2087 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:49:19.162000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 13 00:49:19.172421 kernel: audit: type=1300 audit(1747097359.162:558): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bcc7c0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:49:19.162000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bcc7c0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:49:19.162000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:49:19.176397 kernel: audit: type=1327 audit(1747097359.162:558): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:49:19.464540 systemd[1]: Reloading. May 13 00:49:19.551568 /usr/lib/systemd/system-generators/torcx-generator[2131]: time="2025-05-13T00:49:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 00:49:19.551588 /usr/lib/systemd/system-generators/torcx-generator[2131]: time="2025-05-13T00:49:19Z" level=info msg="torcx already run" May 13 00:49:19.610388 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 00:49:19.610401 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 00:49:19.622591 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 00:49:19.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.691884 kernel: audit: type=1400 audit(1747097359.685:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.692000 kernel: audit: type=1400 audit(1747097359.685:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.692033 kernel: audit: type=1400 audit(1747097359.686:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.697462 kernel: audit: type=1400 audit(1747097359.686:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.697555 kernel: audit: type=1400 audit(1747097359.686:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700376 kernel: audit: type=1400 audit(1747097359.686:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.706034 kernel: audit: type=1400 audit(1747097359.686:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.694000 audit: BPF prog-id=79 op=LOAD May 13 00:49:19.694000 audit: BPF prog-id=75 op=UNLOAD May 13 00:49:19.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit: BPF prog-id=80 op=LOAD May 13 00:49:19.700000 audit: BPF prog-id=40 op=UNLOAD May 13 00:49:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.706000 audit: BPF prog-id=81 op=LOAD May 13 00:49:19.706000 audit: BPF prog-id=41 op=UNLOAD May 13 00:49:19.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.707000 audit: BPF prog-id=82 op=LOAD May 13 00:49:19.707000 audit: BPF prog-id=42 op=UNLOAD May 13 00:49:19.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.709000 audit: BPF prog-id=83 op=LOAD May 13 00:49:19.709000 audit: BPF prog-id=71 op=UNLOAD May 13 00:49:19.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit: BPF prog-id=84 op=LOAD May 13 00:49:19.711000 audit: BPF prog-id=43 op=UNLOAD May 13 00:49:19.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit: BPF prog-id=85 op=LOAD May 13 00:49:19.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.712000 audit: BPF prog-id=86 op=LOAD May 13 00:49:19.712000 audit: BPF prog-id=44 op=UNLOAD May 13 00:49:19.712000 audit: BPF prog-id=45 op=UNLOAD May 13 00:49:19.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.714000 audit: BPF prog-id=87 op=LOAD May 13 00:49:19.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.716000 audit: BPF prog-id=88 op=LOAD May 13 00:49:19.716000 audit: BPF prog-id=46 op=UNLOAD May 13 00:49:19.716000 audit: BPF prog-id=47 op=UNLOAD May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit: BPF prog-id=89 op=LOAD May 13 00:49:19.717000 audit: BPF prog-id=67 op=UNLOAD May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit: BPF prog-id=90 op=LOAD May 13 00:49:19.718000 audit: BPF prog-id=48 op=UNLOAD May 13 00:49:19.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.718000 audit: BPF prog-id=91 op=LOAD May 13 00:49:19.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.719000 audit: BPF prog-id=92 op=LOAD May 13 00:49:19.719000 audit: BPF prog-id=49 op=UNLOAD May 13 00:49:19.719000 audit: BPF prog-id=50 op=UNLOAD May 13 00:49:19.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.720000 audit: BPF prog-id=93 op=LOAD May 13 00:49:19.720000 audit: BPF prog-id=59 op=UNLOAD May 13 00:49:19.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit: BPF prog-id=94 op=LOAD May 13 00:49:19.722000 audit: BPF prog-id=63 op=UNLOAD May 13 00:49:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.722000 audit: BPF prog-id=95 op=LOAD May 13 00:49:19.722000 audit: BPF prog-id=51 op=UNLOAD May 13 00:49:19.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit: BPF prog-id=96 op=LOAD May 13 00:49:19.724000 audit: BPF prog-id=55 op=UNLOAD May 13 00:49:19.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.724000 audit: BPF prog-id=97 op=LOAD May 13 00:49:19.724000 audit: BPF prog-id=52 op=UNLOAD May 13 00:49:19.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit: BPF prog-id=98 op=LOAD May 13 00:49:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:19.725000 audit: BPF prog-id=99 op=LOAD May 13 00:49:19.725000 audit: BPF prog-id=53 op=UNLOAD May 13 00:49:19.725000 audit: BPF prog-id=54 op=UNLOAD May 13 00:49:19.736167 systemd[1]: Stopping kubelet.service... May 13 00:49:19.748626 systemd[1]: kubelet.service: Deactivated successfully. May 13 00:49:19.748891 systemd[1]: Stopped kubelet.service. May 13 00:49:19.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:19.750529 systemd[1]: Starting kubelet.service... May 13 00:49:20.859000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:20.859000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00109ac20 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:49:20.859000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:49:20.859000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:20.859000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00109ae00 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:49:20.859000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:49:20.860000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:20.860000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:49:20.860000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00109afe0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:49:20.860000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:49:20.860000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ef9fe0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:49:20.860000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:49:22.187534 systemd[1]: Started kubelet.service. May 13 00:49:22.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:22.305311 kubelet[2195]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:49:22.305539 kubelet[2195]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 00:49:22.305587 kubelet[2195]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 00:49:22.305674 kubelet[2195]: I0513 00:49:22.305654 2195 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 00:49:22.320621 kubelet[2195]: I0513 00:49:22.320598 2195 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 13 00:49:22.320621 kubelet[2195]: I0513 00:49:22.320615 2195 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 00:49:22.321497 kubelet[2195]: I0513 00:49:22.321483 2195 server.go:927] "Client rotation is on, will bootstrap in background" May 13 00:49:22.323205 kubelet[2195]: I0513 00:49:22.323193 2195 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 13 00:49:22.386225 kubelet[2195]: I0513 00:49:22.386190 2195 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 00:49:22.452131 kubelet[2195]: I0513 00:49:22.451694 2195 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 00:49:22.452131 kubelet[2195]: I0513 00:49:22.451852 2195 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 00:49:22.452131 kubelet[2195]: I0513 00:49:22.451868 2195 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 13 00:49:22.452131 kubelet[2195]: I0513 00:49:22.452018 2195 topology_manager.go:138] "Creating topology manager with none policy" May 13 00:49:22.452756 kubelet[2195]: I0513 00:49:22.452028 2195 container_manager_linux.go:301] "Creating device plugin manager" May 13 00:49:22.452756 kubelet[2195]: I0513 00:49:22.452093 2195 state_mem.go:36] "Initialized new in-memory state store" May 13 00:49:22.452756 kubelet[2195]: I0513 00:49:22.452149 2195 kubelet.go:400] "Attempting to sync node with API server" May 13 00:49:22.452756 kubelet[2195]: I0513 00:49:22.452160 2195 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 00:49:22.452756 kubelet[2195]: I0513 00:49:22.452174 2195 kubelet.go:312] "Adding apiserver pod source" May 13 00:49:22.452756 kubelet[2195]: I0513 00:49:22.452186 2195 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 00:49:22.453178 kubelet[2195]: I0513 00:49:22.453165 2195 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 00:49:22.453373 kubelet[2195]: I0513 00:49:22.453363 2195 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 00:49:22.453695 kubelet[2195]: I0513 00:49:22.453686 2195 server.go:1264] "Started kubelet" May 13 00:49:22.455290 kubelet[2195]: I0513 00:49:22.455276 2195 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 00:49:22.455406 kubelet[2195]: I0513 00:49:22.455393 2195 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 00:49:22.455494 kubelet[2195]: I0513 00:49:22.455484 2195 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 00:49:22.454000 audit[2195]: AVC avc: denied { mac_admin } for pid=2195 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:22.454000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:49:22.454000 audit[2195]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a7a720 a1=c00091e948 a2=c000a7a6f0 a3=25 items=0 ppid=1 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:22.454000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:49:22.455000 audit[2195]: AVC avc: denied { mac_admin } for pid=2195 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:22.455000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:49:22.455000 audit[2195]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006e8860 a1=c00091e960 a2=c000a7a7b0 a3=25 items=0 ppid=1 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:22.455000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:49:22.465933 kubelet[2195]: I0513 00:49:22.465906 2195 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 00:49:22.467004 kubelet[2195]: I0513 00:49:22.466906 2195 server.go:455] "Adding debug handlers to kubelet server" May 13 00:49:22.467711 kubelet[2195]: I0513 00:49:22.467680 2195 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 00:49:22.475364 kubelet[2195]: I0513 00:49:22.472273 2195 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 00:49:22.475364 kubelet[2195]: I0513 00:49:22.468593 2195 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 13 00:49:22.475364 kubelet[2195]: I0513 00:49:22.468583 2195 volume_manager.go:291] "Starting Kubelet Volume Manager" May 13 00:49:22.475364 kubelet[2195]: I0513 00:49:22.474474 2195 reconciler.go:26] "Reconciler: start to sync state" May 13 00:49:22.480300 kubelet[2195]: I0513 00:49:22.478925 2195 factory.go:221] Registration of the systemd container factory successfully May 13 00:49:22.480300 kubelet[2195]: I0513 00:49:22.478975 2195 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 00:49:22.509979 kubelet[2195]: I0513 00:49:22.509957 2195 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 00:49:22.510958 kubelet[2195]: I0513 00:49:22.510934 2195 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 00:49:22.511054 kubelet[2195]: I0513 00:49:22.511044 2195 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 00:49:22.511126 kubelet[2195]: I0513 00:49:22.511117 2195 kubelet.go:2337] "Starting kubelet main sync loop" May 13 00:49:22.511223 kubelet[2195]: E0513 00:49:22.511208 2195 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 13 00:49:22.556587 kubelet[2195]: E0513 00:49:22.556534 2195 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 00:49:22.556689 kubelet[2195]: I0513 00:49:22.556616 2195 factory.go:221] Registration of the containerd container factory successfully May 13 00:49:22.591616 kubelet[2195]: I0513 00:49:22.591600 2195 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 13 00:49:22.598154 kubelet[2195]: I0513 00:49:22.598133 2195 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 13 00:49:22.598495 kubelet[2195]: I0513 00:49:22.598477 2195 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 13 00:49:22.612868 kubelet[2195]: E0513 00:49:22.612847 2195 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 13 00:49:22.616894 kubelet[2195]: I0513 00:49:22.616882 2195 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 00:49:22.616993 kubelet[2195]: I0513 00:49:22.616984 2195 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 00:49:22.617055 kubelet[2195]: I0513 00:49:22.617040 2195 state_mem.go:36] "Initialized new in-memory state store" May 13 00:49:22.617202 kubelet[2195]: I0513 00:49:22.617194 2195 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 13 00:49:22.617268 kubelet[2195]: I0513 00:49:22.617253 2195 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 13 00:49:22.617313 kubelet[2195]: I0513 00:49:22.617307 2195 policy_none.go:49] "None policy: Start" May 13 00:49:22.618381 kubelet[2195]: I0513 00:49:22.618373 2195 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 00:49:22.618450 kubelet[2195]: I0513 00:49:22.618443 2195 state_mem.go:35] "Initializing new in-memory state store" May 13 00:49:22.618644 kubelet[2195]: I0513 00:49:22.618637 2195 state_mem.go:75] "Updated machine memory state" May 13 00:49:22.621383 kubelet[2195]: I0513 00:49:22.621373 2195 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 00:49:22.621000 audit[2195]: AVC avc: denied { mac_admin } for pid=2195 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:22.621000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 00:49:22.621000 audit[2195]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b6bb30 a1=c000fd7a40 a2=c000b6bb00 a3=25 items=0 ppid=1 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:22.621000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 00:49:22.621693 kubelet[2195]: I0513 00:49:22.621684 2195 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 00:49:22.621837 kubelet[2195]: I0513 00:49:22.621821 2195 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 00:49:22.622996 kubelet[2195]: I0513 00:49:22.622989 2195 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 00:49:22.813070 kubelet[2195]: I0513 00:49:22.812987 2195 topology_manager.go:215] "Topology Admit Handler" podUID="5fb90cafdd82145cf4a0ef2a99c4666d" podNamespace="kube-system" podName="kube-apiserver-localhost" May 13 00:49:22.813390 kubelet[2195]: I0513 00:49:22.813376 2195 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 13 00:49:22.813580 kubelet[2195]: I0513 00:49:22.813567 2195 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 13 00:49:22.831091 kubelet[2195]: E0513 00:49:22.831064 2195 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 13 00:49:22.831467 kubelet[2195]: E0513 00:49:22.831454 2195 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 13 00:49:22.901919 kubelet[2195]: I0513 00:49:22.901889 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5fb90cafdd82145cf4a0ef2a99c4666d-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"5fb90cafdd82145cf4a0ef2a99c4666d\") " pod="kube-system/kube-apiserver-localhost" May 13 00:49:22.902069 kubelet[2195]: I0513 00:49:22.902053 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5fb90cafdd82145cf4a0ef2a99c4666d-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"5fb90cafdd82145cf4a0ef2a99c4666d\") " pod="kube-system/kube-apiserver-localhost" May 13 00:49:22.902165 kubelet[2195]: I0513 00:49:22.902156 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:22.902240 kubelet[2195]: I0513 00:49:22.902231 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:22.902316 kubelet[2195]: I0513 00:49:22.902306 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 13 00:49:22.902387 kubelet[2195]: I0513 00:49:22.902378 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5fb90cafdd82145cf4a0ef2a99c4666d-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"5fb90cafdd82145cf4a0ef2a99c4666d\") " pod="kube-system/kube-apiserver-localhost" May 13 00:49:22.902451 kubelet[2195]: I0513 00:49:22.902443 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:22.902507 kubelet[2195]: I0513 00:49:22.902497 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:22.902588 kubelet[2195]: I0513 00:49:22.902578 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 13 00:49:23.504188 kubelet[2195]: I0513 00:49:23.504168 2195 apiserver.go:52] "Watching apiserver" May 13 00:49:23.572827 kubelet[2195]: I0513 00:49:23.572801 2195 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 13 00:49:23.672810 kubelet[2195]: E0513 00:49:23.672786 2195 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 13 00:49:23.728346 kubelet[2195]: I0513 00:49:23.728297 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.728281119 podStartE2EDuration="1.728281119s" podCreationTimestamp="2025-05-13 00:49:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:49:23.673745946 +0000 UTC m=+1.438800378" watchObservedRunningTime="2025-05-13 00:49:23.728281119 +0000 UTC m=+1.493335547" May 13 00:49:23.833771 kubelet[2195]: I0513 00:49:23.833680 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=5.8336646640000005 podStartE2EDuration="5.833664664s" podCreationTimestamp="2025-05-13 00:49:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:49:23.728849964 +0000 UTC m=+1.493904394" watchObservedRunningTime="2025-05-13 00:49:23.833664664 +0000 UTC m=+1.598719103" May 13 00:49:23.872292 kubelet[2195]: I0513 00:49:23.872258 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=4.872243168 podStartE2EDuration="4.872243168s" podCreationTimestamp="2025-05-13 00:49:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:49:23.834245792 +0000 UTC m=+1.599300230" watchObservedRunningTime="2025-05-13 00:49:23.872243168 +0000 UTC m=+1.637297597" May 13 00:49:27.457124 sudo[1477]: pam_unix(sudo:session): session closed for user root May 13 00:49:27.461352 kernel: kauditd_printk_skb: 263 callbacks suppressed May 13 00:49:27.461409 kernel: audit: type=1106 audit(1747097367.456:812): pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:49:27.456000 audit[1477]: USER_END pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:49:27.456000 audit[1477]: CRED_DISP pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:49:27.463633 sshd[1473]: pam_unix(sshd:session): session closed for user core May 13 00:49:27.464511 kernel: audit: type=1104 audit(1747097367.456:813): pid=1477 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 00:49:27.464000 audit[1473]: USER_END pid=1473 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:49:27.466403 systemd[1]: sshd@6-139.178.70.103:22-147.75.109.163:51322.service: Deactivated successfully. May 13 00:49:27.466870 systemd[1]: session-9.scope: Deactivated successfully. May 13 00:49:27.466950 systemd[1]: session-9.scope: Consumed 2.889s CPU time. May 13 00:49:27.468880 kernel: audit: type=1106 audit(1747097367.464:814): pid=1473 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:49:27.464000 audit[1473]: CRED_DISP pid=1473 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:49:27.469237 systemd-logind[1240]: Session 9 logged out. Waiting for processes to exit. May 13 00:49:27.472325 kernel: audit: type=1104 audit(1747097367.464:815): pid=1473 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:49:27.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-147.75.109.163:51322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:27.475824 systemd-logind[1240]: Removed session 9. May 13 00:49:27.476407 kernel: audit: type=1131 audit(1747097367.466:816): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.103:22-147.75.109.163:51322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:49:32.416405 kubelet[2195]: I0513 00:49:32.416383 2195 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 13 00:49:32.417031 env[1255]: time="2025-05-13T00:49:32.416980941Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 00:49:32.417305 kubelet[2195]: I0513 00:49:32.417284 2195 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 13 00:49:33.338749 kubelet[2195]: I0513 00:49:33.338718 2195 topology_manager.go:215] "Topology Admit Handler" podUID="ceac0345-c0ee-41af-a45e-be03235eb615" podNamespace="kube-system" podName="kube-proxy-nqcmz" May 13 00:49:33.342584 systemd[1]: Created slice kubepods-besteffort-podceac0345_c0ee_41af_a45e_be03235eb615.slice. May 13 00:49:33.480543 kubelet[2195]: I0513 00:49:33.480494 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ceac0345-c0ee-41af-a45e-be03235eb615-xtables-lock\") pod \"kube-proxy-nqcmz\" (UID: \"ceac0345-c0ee-41af-a45e-be03235eb615\") " pod="kube-system/kube-proxy-nqcmz" May 13 00:49:33.480543 kubelet[2195]: I0513 00:49:33.480539 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ceac0345-c0ee-41af-a45e-be03235eb615-kube-proxy\") pod \"kube-proxy-nqcmz\" (UID: \"ceac0345-c0ee-41af-a45e-be03235eb615\") " pod="kube-system/kube-proxy-nqcmz" May 13 00:49:33.480907 kubelet[2195]: I0513 00:49:33.480575 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ceac0345-c0ee-41af-a45e-be03235eb615-lib-modules\") pod \"kube-proxy-nqcmz\" (UID: \"ceac0345-c0ee-41af-a45e-be03235eb615\") " pod="kube-system/kube-proxy-nqcmz" May 13 00:49:33.480907 kubelet[2195]: I0513 00:49:33.480595 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dqk2m\" (UniqueName: \"kubernetes.io/projected/ceac0345-c0ee-41af-a45e-be03235eb615-kube-api-access-dqk2m\") pod \"kube-proxy-nqcmz\" (UID: \"ceac0345-c0ee-41af-a45e-be03235eb615\") " pod="kube-system/kube-proxy-nqcmz" May 13 00:49:33.537176 kubelet[2195]: I0513 00:49:33.537151 2195 topology_manager.go:215] "Topology Admit Handler" podUID="864ff714-4e80-4f45-97f5-2fb42d67c24d" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-s8rnn" May 13 00:49:33.541004 systemd[1]: Created slice kubepods-besteffort-pod864ff714_4e80_4f45_97f5_2fb42d67c24d.slice. May 13 00:49:33.549007 kubelet[2195]: W0513 00:49:33.548979 2195 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 13 00:49:33.549166 kubelet[2195]: E0513 00:49:33.549155 2195 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'localhost' and this object May 13 00:49:33.654126 env[1255]: time="2025-05-13T00:49:33.654036047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nqcmz,Uid:ceac0345-c0ee-41af-a45e-be03235eb615,Namespace:kube-system,Attempt:0,}" May 13 00:49:33.681705 kubelet[2195]: I0513 00:49:33.681588 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c98jw\" (UniqueName: \"kubernetes.io/projected/864ff714-4e80-4f45-97f5-2fb42d67c24d-kube-api-access-c98jw\") pod \"tigera-operator-797db67f8-s8rnn\" (UID: \"864ff714-4e80-4f45-97f5-2fb42d67c24d\") " pod="tigera-operator/tigera-operator-797db67f8-s8rnn" May 13 00:49:33.681705 kubelet[2195]: I0513 00:49:33.681634 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/864ff714-4e80-4f45-97f5-2fb42d67c24d-var-lib-calico\") pod \"tigera-operator-797db67f8-s8rnn\" (UID: \"864ff714-4e80-4f45-97f5-2fb42d67c24d\") " pod="tigera-operator/tigera-operator-797db67f8-s8rnn" May 13 00:49:33.688035 env[1255]: time="2025-05-13T00:49:33.687964627Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:49:33.688035 env[1255]: time="2025-05-13T00:49:33.688010312Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:49:33.688202 env[1255]: time="2025-05-13T00:49:33.688020902Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:49:33.688328 env[1255]: time="2025-05-13T00:49:33.688305889Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c4b5d96e5e69d6cefbcd484e2ddceece02398aa564f5d134ed0ff8ee15e873c0 pid=2279 runtime=io.containerd.runc.v2 May 13 00:49:33.702591 systemd[1]: run-containerd-runc-k8s.io-c4b5d96e5e69d6cefbcd484e2ddceece02398aa564f5d134ed0ff8ee15e873c0-runc.GMoQqS.mount: Deactivated successfully. May 13 00:49:33.707485 systemd[1]: Started cri-containerd-c4b5d96e5e69d6cefbcd484e2ddceece02398aa564f5d134ed0ff8ee15e873c0.scope. May 13 00:49:33.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.721901 kernel: audit: type=1400 audit(1747097373.715:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.722047 kernel: audit: type=1400 audit(1747097373.715:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.722075 kernel: audit: type=1400 audit(1747097373.715:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.727816 kernel: audit: type=1400 audit(1747097373.715:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.727944 kernel: audit: type=1400 audit(1747097373.715:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.733623 kernel: audit: type=1400 audit(1747097373.715:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.733747 kernel: audit: type=1400 audit(1747097373.715:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.739882 kernel: audit: type=1400 audit(1747097373.715:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.739981 kernel: audit: type=1400 audit(1747097373.715:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.746361 kernel: audit: type=1400 audit(1747097373.715:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.715000 audit: BPF prog-id=100 op=LOAD May 13 00:49:33.718000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2279 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623564393665356536396436636566626364343834653264646365 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2279 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623564393665356536396436636566626364343834653264646365 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.718000 audit: BPF prog-id=101 op=LOAD May 13 00:49:33.718000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024380 items=0 ppid=2279 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623564393665356536396436636566626364343834653264646365 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.724000 audit: BPF prog-id=102 op=LOAD May 13 00:49:33.724000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243c8 items=0 ppid=2279 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623564393665356536396436636566626364343834653264646365 May 13 00:49:33.730000 audit: BPF prog-id=102 op=UNLOAD May 13 00:49:33.730000 audit: BPF prog-id=101 op=UNLOAD May 13 00:49:33.730000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.730000 audit: BPF prog-id=103 op=LOAD May 13 00:49:33.730000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000247d8 items=0 ppid=2279 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334623564393665356536396436636566626364343834653264646365 May 13 00:49:33.756927 env[1255]: time="2025-05-13T00:49:33.756902552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nqcmz,Uid:ceac0345-c0ee-41af-a45e-be03235eb615,Namespace:kube-system,Attempt:0,} returns sandbox id \"c4b5d96e5e69d6cefbcd484e2ddceece02398aa564f5d134ed0ff8ee15e873c0\"" May 13 00:49:33.759033 env[1255]: time="2025-05-13T00:49:33.759008022Z" level=info msg="CreateContainer within sandbox \"c4b5d96e5e69d6cefbcd484e2ddceece02398aa564f5d134ed0ff8ee15e873c0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 00:49:33.793205 env[1255]: time="2025-05-13T00:49:33.793167602Z" level=info msg="CreateContainer within sandbox \"c4b5d96e5e69d6cefbcd484e2ddceece02398aa564f5d134ed0ff8ee15e873c0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6700dd488fb9d05670a4be2cfb5e269ce3dc36e982c1bf738740702e65a8c8c5\"" May 13 00:49:33.793777 env[1255]: time="2025-05-13T00:49:33.793757868Z" level=info msg="StartContainer for \"6700dd488fb9d05670a4be2cfb5e269ce3dc36e982c1bf738740702e65a8c8c5\"" May 13 00:49:33.805395 systemd[1]: Started cri-containerd-6700dd488fb9d05670a4be2cfb5e269ce3dc36e982c1bf738740702e65a8c8c5.scope. May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f1d802c5958 items=0 ppid=2279 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303064643438386662396430353637306134626532636662356532 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit: BPF prog-id=104 op=LOAD May 13 00:49:33.817000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000282f58 items=0 ppid=2279 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303064643438386662396430353637306134626532636662356532 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit: BPF prog-id=105 op=LOAD May 13 00:49:33.817000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000282fa8 items=0 ppid=2279 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303064643438386662396430353637306134626532636662356532 May 13 00:49:33.817000 audit: BPF prog-id=105 op=UNLOAD May 13 00:49:33.817000 audit: BPF prog-id=104 op=UNLOAD May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.817000 audit: BPF prog-id=106 op=LOAD May 13 00:49:33.817000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000283038 items=0 ppid=2279 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637303064643438386662396430353637306134626532636662356532 May 13 00:49:33.826980 env[1255]: time="2025-05-13T00:49:33.826951744Z" level=info msg="StartContainer for \"6700dd488fb9d05670a4be2cfb5e269ce3dc36e982c1bf738740702e65a8c8c5\" returns successfully" May 13 00:49:33.844542 env[1255]: time="2025-05-13T00:49:33.844501252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-s8rnn,Uid:864ff714-4e80-4f45-97f5-2fb42d67c24d,Namespace:tigera-operator,Attempt:0,}" May 13 00:49:33.881461 env[1255]: time="2025-05-13T00:49:33.881323311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:49:33.881461 env[1255]: time="2025-05-13T00:49:33.881367638Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:49:33.881461 env[1255]: time="2025-05-13T00:49:33.881375350Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:49:33.881710 env[1255]: time="2025-05-13T00:49:33.881668190Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95c9bb725ac1563d9c19eb12070d6de3e737586758817564bf701b556a1f9270 pid=2352 runtime=io.containerd.runc.v2 May 13 00:49:33.888888 systemd[1]: Started cri-containerd-95c9bb725ac1563d9c19eb12070d6de3e737586758817564bf701b556a1f9270.scope. May 13 00:49:33.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.901000 audit: BPF prog-id=107 op=LOAD May 13 00:49:33.901000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.901000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2352 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633962623732356163313536336439633139656231323037306436 May 13 00:49:33.901000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.901000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2352 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633962623732356163313536336439633139656231323037306436 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit: BPF prog-id=108 op=LOAD May 13 00:49:33.902000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000381d90 items=0 ppid=2352 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633962623732356163313536336439633139656231323037306436 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.902000 audit: BPF prog-id=109 op=LOAD May 13 00:49:33.902000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000381dd8 items=0 ppid=2352 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633962623732356163313536336439633139656231323037306436 May 13 00:49:33.903000 audit: BPF prog-id=109 op=UNLOAD May 13 00:49:33.903000 audit: BPF prog-id=108 op=UNLOAD May 13 00:49:33.903000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:33.903000 audit: BPF prog-id=110 op=LOAD May 13 00:49:33.903000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f61e8 items=0 ppid=2352 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:33.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935633962623732356163313536336439633139656231323037306436 May 13 00:49:33.929282 env[1255]: time="2025-05-13T00:49:33.929243139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-s8rnn,Uid:864ff714-4e80-4f45-97f5-2fb42d67c24d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"95c9bb725ac1563d9c19eb12070d6de3e737586758817564bf701b556a1f9270\"" May 13 00:49:33.932989 env[1255]: time="2025-05-13T00:49:33.932960282Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 13 00:49:34.427000 audit[2415]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.427000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb3e2e9b0 a2=0 a3=7fffb3e2e99c items=0 ppid=2331 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:49:34.428000 audit[2416]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.428000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd14e8e610 a2=0 a3=7ffd14e8e5fc items=0 ppid=2331 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:49:34.428000 audit[2417]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.428000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdba0e68e0 a2=0 a3=7ffdba0e68cc items=0 ppid=2331 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:49:34.429000 audit[2418]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.429000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7f4bb260 a2=0 a3=7ffc7f4bb24c items=0 ppid=2331 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 00:49:34.430000 audit[2419]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.430000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc33accc30 a2=0 a3=7ffc33accc1c items=0 ppid=2331 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 00:49:34.431000 audit[2420]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.431000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7b2977d0 a2=0 a3=7ffc7b2977bc items=0 ppid=2331 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 00:49:34.553000 audit[2421]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.553000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdc0076540 a2=0 a3=7ffdc007652c items=0 ppid=2331 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:49:34.595000 audit[2423]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.595000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcd6aeac20 a2=0 a3=7ffcd6aeac0c items=0 ppid=2331 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 00:49:34.605000 audit[2426]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.605000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff145008d0 a2=0 a3=7fff145008bc items=0 ppid=2331 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 00:49:34.606000 audit[2427]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.606000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc932af180 a2=0 a3=7ffc932af16c items=0 ppid=2331 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:49:34.608000 audit[2429]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.608000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4eea2b10 a2=0 a3=7ffe4eea2afc items=0 ppid=2331 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:49:34.609000 audit[2430]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.609000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe06155930 a2=0 a3=7ffe0615591c items=0 ppid=2331 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:49:34.612000 audit[2432]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.612000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe3eff2c70 a2=0 a3=7ffe3eff2c5c items=0 ppid=2331 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:49:34.615000 audit[2435]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.615000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee50cf550 a2=0 a3=7ffee50cf53c items=0 ppid=2331 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 00:49:34.616000 audit[2436]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.616000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee78cf9b0 a2=0 a3=7ffee78cf99c items=0 ppid=2331 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:49:34.618000 audit[2438]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.618000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff07e4cf10 a2=0 a3=7fff07e4cefc items=0 ppid=2331 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:49:34.619000 audit[2439]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.619000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff65f66800 a2=0 a3=7fff65f667ec items=0 ppid=2331 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:49:34.621000 audit[2441]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.621000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9d5ac0a0 a2=0 a3=7ffd9d5ac08c items=0 ppid=2331 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.621000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:49:34.623000 audit[2444]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.623000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf9312400 a2=0 a3=7ffcf93123ec items=0 ppid=2331 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:49:34.626000 audit[2447]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.626000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed37b9a70 a2=0 a3=7ffed37b9a5c items=0 ppid=2331 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:49:34.626000 audit[2448]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.626000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd41347c0 a2=0 a3=7fffd41347ac items=0 ppid=2331 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:49:34.638000 audit[2450]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.638000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffa53cf390 a2=0 a3=7fffa53cf37c items=0 ppid=2331 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:49:34.641000 audit[2453]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.641000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe814ca330 a2=0 a3=7ffe814ca31c items=0 ppid=2331 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:49:34.641000 audit[2454]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.641000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca83ef9f0 a2=0 a3=7ffca83ef9dc items=0 ppid=2331 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:49:34.643000 audit[2456]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 00:49:34.643000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd90e0f3e0 a2=0 a3=7ffd90e0f3cc items=0 ppid=2331 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:49:34.664000 audit[2462]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:34.664000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdeb62b7a0 a2=0 a3=7ffdeb62b78c items=0 ppid=2331 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:34.672000 audit[2462]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:34.672000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdeb62b7a0 a2=0 a3=7ffdeb62b78c items=0 ppid=2331 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:34.673000 audit[2467]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.673000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffef20c3940 a2=0 a3=7ffef20c392c items=0 ppid=2331 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 00:49:34.677000 audit[2469]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.677000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc27c70f40 a2=0 a3=7ffc27c70f2c items=0 ppid=2331 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 00:49:34.680000 audit[2472]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.680000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd34b7a00 a2=0 a3=7ffcd34b79ec items=0 ppid=2331 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 00:49:34.682000 audit[2473]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.682000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbef32500 a2=0 a3=7fffbef324ec items=0 ppid=2331 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 00:49:34.684000 audit[2475]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.684000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5da5e1d0 a2=0 a3=7ffd5da5e1bc items=0 ppid=2331 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 00:49:34.684000 audit[2476]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.684000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe80b35250 a2=0 a3=7ffe80b3523c items=0 ppid=2331 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 00:49:34.686000 audit[2478]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.686000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb0493970 a2=0 a3=7ffcb049395c items=0 ppid=2331 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 00:49:34.688000 audit[2481]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.688000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdd9f107b0 a2=0 a3=7ffdd9f1079c items=0 ppid=2331 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 00:49:34.689000 audit[2482]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.689000 audit[2482]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe104ef50 a2=0 a3=7fffe104ef3c items=0 ppid=2331 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 00:49:34.691000 audit[2484]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.691000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd61ba66e0 a2=0 a3=7ffd61ba66cc items=0 ppid=2331 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 00:49:34.691000 audit[2485]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.691000 audit[2485]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefdb9d9b0 a2=0 a3=7ffefdb9d99c items=0 ppid=2331 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 00:49:34.693000 audit[2487]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.693000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd11bab310 a2=0 a3=7ffd11bab2fc items=0 ppid=2331 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 00:49:34.695000 audit[2490]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.695000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc7e8e220 a2=0 a3=7ffcc7e8e20c items=0 ppid=2331 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 00:49:34.697000 audit[2493]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.697000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca041b950 a2=0 a3=7ffca041b93c items=0 ppid=2331 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 00:49:34.698000 audit[2494]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.698000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa4627b60 a2=0 a3=7fffa4627b4c items=0 ppid=2331 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 00:49:34.700000 audit[2496]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.700000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd071e3520 a2=0 a3=7ffd071e350c items=0 ppid=2331 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:49:34.702000 audit[2499]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.702000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffceaec4990 a2=0 a3=7ffceaec497c items=0 ppid=2331 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 00:49:34.702000 audit[2500]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.702000 audit[2500]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6008b750 a2=0 a3=7ffd6008b73c items=0 ppid=2331 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 00:49:34.704000 audit[2502]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.704000 audit[2502]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc313c78e0 a2=0 a3=7ffc313c78cc items=0 ppid=2331 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 00:49:34.705000 audit[2503]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.705000 audit[2503]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff180ec450 a2=0 a3=7fff180ec43c items=0 ppid=2331 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 00:49:34.706000 audit[2505]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.706000 audit[2505]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe57e36470 a2=0 a3=7ffe57e3645c items=0 ppid=2331 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:49:34.708000 audit[2508]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 00:49:34.708000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdfde156a0 a2=0 a3=7ffdfde1568c items=0 ppid=2331 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 00:49:34.710000 audit[2510]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:49:34.710000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fffbcf657c0 a2=0 a3=7fffbcf657ac items=0 ppid=2331 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.710000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:34.711000 audit[2510]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 00:49:34.711000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffbcf657c0 a2=0 a3=7fffbcf657ac items=0 ppid=2331 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:34.711000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:35.630736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3305595386.mount: Deactivated successfully. May 13 00:49:36.223987 env[1255]: time="2025-05-13T00:49:36.223867824Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:36.224795 env[1255]: time="2025-05-13T00:49:36.224770809Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:36.225858 env[1255]: time="2025-05-13T00:49:36.225832505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:36.226925 env[1255]: time="2025-05-13T00:49:36.226907283Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:36.227508 env[1255]: time="2025-05-13T00:49:36.227478917Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 13 00:49:36.230603 env[1255]: time="2025-05-13T00:49:36.230568800Z" level=info msg="CreateContainer within sandbox \"95c9bb725ac1563d9c19eb12070d6de3e737586758817564bf701b556a1f9270\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 13 00:49:36.237526 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3236850907.mount: Deactivated successfully. May 13 00:49:36.241989 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1364382667.mount: Deactivated successfully. May 13 00:49:36.254420 env[1255]: time="2025-05-13T00:49:36.254387812Z" level=info msg="CreateContainer within sandbox \"95c9bb725ac1563d9c19eb12070d6de3e737586758817564bf701b556a1f9270\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"15fe71ba34feafa2e38c41d4c047685376ba5129539b051628769abe2edae688\"" May 13 00:49:36.256134 env[1255]: time="2025-05-13T00:49:36.256094129Z" level=info msg="StartContainer for \"15fe71ba34feafa2e38c41d4c047685376ba5129539b051628769abe2edae688\"" May 13 00:49:36.269975 systemd[1]: Started cri-containerd-15fe71ba34feafa2e38c41d4c047685376ba5129539b051628769abe2edae688.scope. May 13 00:49:36.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.293000 audit: BPF prog-id=111 op=LOAD May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2352 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:36.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666537316261333466656166613265333863343164346330343736 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2352 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:36.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666537316261333466656166613265333863343164346330343736 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit: BPF prog-id=112 op=LOAD May 13 00:49:36.294000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dfaf0 items=0 ppid=2352 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:36.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666537316261333466656166613265333863343164346330343736 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit: BPF prog-id=113 op=LOAD May 13 00:49:36.294000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dfb38 items=0 ppid=2352 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:36.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666537316261333466656166613265333863343164346330343736 May 13 00:49:36.294000 audit: BPF prog-id=113 op=UNLOAD May 13 00:49:36.294000 audit: BPF prog-id=112 op=UNLOAD May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:36.294000 audit: BPF prog-id=114 op=LOAD May 13 00:49:36.294000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dff48 items=0 ppid=2352 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:36.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666537316261333466656166613265333863343164346330343736 May 13 00:49:36.333628 env[1255]: time="2025-05-13T00:49:36.333596882Z" level=info msg="StartContainer for \"15fe71ba34feafa2e38c41d4c047685376ba5129539b051628769abe2edae688\" returns successfully" May 13 00:49:36.676751 kubelet[2195]: I0513 00:49:36.676705 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-nqcmz" podStartSLOduration=3.6766877449999997 podStartE2EDuration="3.676687745s" podCreationTimestamp="2025-05-13 00:49:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:49:34.676259628 +0000 UTC m=+12.441314063" watchObservedRunningTime="2025-05-13 00:49:36.676687745 +0000 UTC m=+14.441742171" May 13 00:49:39.085352 kernel: kauditd_printk_skb: 357 callbacks suppressed May 13 00:49:39.085445 kernel: audit: type=1325 audit(1747097379.083:928): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:39.083000 audit[2552]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:39.083000 audit[2552]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff2c9fe710 a2=0 a3=7fff2c9fe6fc items=0 ppid=2331 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.090571 kernel: audit: type=1300 audit(1747097379.083:928): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff2c9fe710 a2=0 a3=7fff2c9fe6fc items=0 ppid=2331 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:39.092399 kernel: audit: type=1327 audit(1747097379.083:928): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:39.092433 kernel: audit: type=1325 audit(1747097379.090:929): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:39.090000 audit[2552]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:39.090000 audit[2552]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff2c9fe710 a2=0 a3=0 items=0 ppid=2331 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.097950 kernel: audit: type=1300 audit(1747097379.090:929): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff2c9fe710 a2=0 a3=0 items=0 ppid=2331 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:39.099782 kernel: audit: type=1327 audit(1747097379.090:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:39.102000 audit[2554]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:39.102000 audit[2554]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc638cbe0 a2=0 a3=7ffcc638cbcc items=0 ppid=2331 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.108869 kernel: audit: type=1325 audit(1747097379.102:930): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:39.108899 kernel: audit: type=1300 audit(1747097379.102:930): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc638cbe0 a2=0 a3=7ffcc638cbcc items=0 ppid=2331 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:39.110716 kernel: audit: type=1327 audit(1747097379.102:930): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:39.110755 kernel: audit: type=1325 audit(1747097379.109:931): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:39.109000 audit[2554]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:39.109000 audit[2554]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcc638cbe0 a2=0 a3=0 items=0 ppid=2331 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:39.223926 kubelet[2195]: I0513 00:49:39.223888 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-s8rnn" podStartSLOduration=3.926557627 podStartE2EDuration="6.223877639s" podCreationTimestamp="2025-05-13 00:49:33 +0000 UTC" firstStartedPulling="2025-05-13 00:49:33.931365122 +0000 UTC m=+11.696419544" lastFinishedPulling="2025-05-13 00:49:36.228685125 +0000 UTC m=+13.993739556" observedRunningTime="2025-05-13 00:49:36.677545075 +0000 UTC m=+14.442599513" watchObservedRunningTime="2025-05-13 00:49:39.223877639 +0000 UTC m=+16.988932070" May 13 00:49:39.224323 kubelet[2195]: I0513 00:49:39.224308 2195 topology_manager.go:215] "Topology Admit Handler" podUID="3b87c2f6-ed1b-49e8-99ac-bed93f062483" podNamespace="calico-system" podName="calico-typha-6b48cbb896-4b8cb" May 13 00:49:39.228399 systemd[1]: Created slice kubepods-besteffort-pod3b87c2f6_ed1b_49e8_99ac_bed93f062483.slice. May 13 00:49:39.291213 kubelet[2195]: I0513 00:49:39.291184 2195 topology_manager.go:215] "Topology Admit Handler" podUID="9dcdc7e2-e7b4-42e4-9d52-f320a416aae8" podNamespace="calico-system" podName="calico-node-r82xd" May 13 00:49:39.295918 systemd[1]: Created slice kubepods-besteffort-pod9dcdc7e2_e7b4_42e4_9d52_f320a416aae8.slice. May 13 00:49:39.316381 kubelet[2195]: I0513 00:49:39.316354 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3b87c2f6-ed1b-49e8-99ac-bed93f062483-typha-certs\") pod \"calico-typha-6b48cbb896-4b8cb\" (UID: \"3b87c2f6-ed1b-49e8-99ac-bed93f062483\") " pod="calico-system/calico-typha-6b48cbb896-4b8cb" May 13 00:49:39.316528 kubelet[2195]: I0513 00:49:39.316516 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3b87c2f6-ed1b-49e8-99ac-bed93f062483-tigera-ca-bundle\") pod \"calico-typha-6b48cbb896-4b8cb\" (UID: \"3b87c2f6-ed1b-49e8-99ac-bed93f062483\") " pod="calico-system/calico-typha-6b48cbb896-4b8cb" May 13 00:49:39.316597 kubelet[2195]: I0513 00:49:39.316587 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8n8cq\" (UniqueName: \"kubernetes.io/projected/3b87c2f6-ed1b-49e8-99ac-bed93f062483-kube-api-access-8n8cq\") pod \"calico-typha-6b48cbb896-4b8cb\" (UID: \"3b87c2f6-ed1b-49e8-99ac-bed93f062483\") " pod="calico-system/calico-typha-6b48cbb896-4b8cb" May 13 00:49:39.415596 kubelet[2195]: I0513 00:49:39.415564 2195 topology_manager.go:215] "Topology Admit Handler" podUID="43f79210-2931-4b10-89eb-d5d1daf62487" podNamespace="calico-system" podName="csi-node-driver-7pn4l" May 13 00:49:39.415921 kubelet[2195]: E0513 00:49:39.415906 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7pn4l" podUID="43f79210-2931-4b10-89eb-d5d1daf62487" May 13 00:49:39.417410 kubelet[2195]: I0513 00:49:39.417375 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-tigera-ca-bundle\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417517 kubelet[2195]: I0513 00:49:39.417422 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-cni-bin-dir\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417517 kubelet[2195]: I0513 00:49:39.417443 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-var-run-calico\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417517 kubelet[2195]: I0513 00:49:39.417469 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-flexvol-driver-host\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417517 kubelet[2195]: I0513 00:49:39.417483 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-var-lib-calico\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417517 kubelet[2195]: I0513 00:49:39.417505 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q44w8\" (UniqueName: \"kubernetes.io/projected/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-kube-api-access-q44w8\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417625 kubelet[2195]: I0513 00:49:39.417517 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-cni-net-dir\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417625 kubelet[2195]: I0513 00:49:39.417529 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-cni-log-dir\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417625 kubelet[2195]: I0513 00:49:39.417543 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-lib-modules\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417625 kubelet[2195]: I0513 00:49:39.417552 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-node-certs\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417625 kubelet[2195]: I0513 00:49:39.417579 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-xtables-lock\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.417760 kubelet[2195]: I0513 00:49:39.417591 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9dcdc7e2-e7b4-42e4-9d52-f320a416aae8-policysync\") pod \"calico-node-r82xd\" (UID: \"9dcdc7e2-e7b4-42e4-9d52-f320a416aae8\") " pod="calico-system/calico-node-r82xd" May 13 00:49:39.518489 kubelet[2195]: I0513 00:49:39.518450 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/43f79210-2931-4b10-89eb-d5d1daf62487-kubelet-dir\") pod \"csi-node-driver-7pn4l\" (UID: \"43f79210-2931-4b10-89eb-d5d1daf62487\") " pod="calico-system/csi-node-driver-7pn4l" May 13 00:49:39.519055 kubelet[2195]: E0513 00:49:39.519036 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.519150 kubelet[2195]: W0513 00:49:39.519137 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.519224 kubelet[2195]: E0513 00:49:39.519213 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.519450 kubelet[2195]: E0513 00:49:39.519442 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.519521 kubelet[2195]: W0513 00:49:39.519510 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.519580 kubelet[2195]: E0513 00:49:39.519571 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.519774 kubelet[2195]: E0513 00:49:39.519765 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.519837 kubelet[2195]: W0513 00:49:39.519827 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.519900 kubelet[2195]: E0513 00:49:39.519889 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.520065 kubelet[2195]: E0513 00:49:39.520057 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.520130 kubelet[2195]: W0513 00:49:39.520121 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.520194 kubelet[2195]: E0513 00:49:39.520185 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.520499 kubelet[2195]: E0513 00:49:39.520484 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.520499 kubelet[2195]: W0513 00:49:39.520496 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.520580 kubelet[2195]: E0513 00:49:39.520509 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.520706 kubelet[2195]: E0513 00:49:39.520692 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.520706 kubelet[2195]: W0513 00:49:39.520701 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.520787 kubelet[2195]: E0513 00:49:39.520713 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.520904 kubelet[2195]: E0513 00:49:39.520892 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.520904 kubelet[2195]: W0513 00:49:39.520902 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.520983 kubelet[2195]: E0513 00:49:39.520913 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.521102 kubelet[2195]: E0513 00:49:39.521087 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.521102 kubelet[2195]: W0513 00:49:39.521100 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.521207 kubelet[2195]: E0513 00:49:39.521196 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.521526 kubelet[2195]: E0513 00:49:39.521513 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.521526 kubelet[2195]: W0513 00:49:39.521521 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.521638 kubelet[2195]: E0513 00:49:39.521626 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.521766 kubelet[2195]: E0513 00:49:39.521754 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.521766 kubelet[2195]: W0513 00:49:39.521763 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.521861 kubelet[2195]: E0513 00:49:39.521851 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.522009 kubelet[2195]: E0513 00:49:39.521998 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.522009 kubelet[2195]: W0513 00:49:39.522007 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.522121 kubelet[2195]: E0513 00:49:39.522109 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.522258 kubelet[2195]: E0513 00:49:39.522247 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.522258 kubelet[2195]: W0513 00:49:39.522256 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.522367 kubelet[2195]: E0513 00:49:39.522270 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.522487 kubelet[2195]: E0513 00:49:39.522475 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.522487 kubelet[2195]: W0513 00:49:39.522485 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.522569 kubelet[2195]: E0513 00:49:39.522497 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.522682 kubelet[2195]: E0513 00:49:39.522671 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.522682 kubelet[2195]: W0513 00:49:39.522679 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.522763 kubelet[2195]: E0513 00:49:39.522689 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.522763 kubelet[2195]: I0513 00:49:39.522705 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/43f79210-2931-4b10-89eb-d5d1daf62487-varrun\") pod \"csi-node-driver-7pn4l\" (UID: \"43f79210-2931-4b10-89eb-d5d1daf62487\") " pod="calico-system/csi-node-driver-7pn4l" May 13 00:49:39.522905 kubelet[2195]: E0513 00:49:39.522891 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.522905 kubelet[2195]: W0513 00:49:39.522901 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.522974 kubelet[2195]: E0513 00:49:39.522908 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.523630 kubelet[2195]: E0513 00:49:39.523614 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.523630 kubelet[2195]: W0513 00:49:39.523624 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.523757 kubelet[2195]: E0513 00:49:39.523745 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.523935 kubelet[2195]: E0513 00:49:39.523917 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.523935 kubelet[2195]: W0513 00:49:39.523932 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.524051 kubelet[2195]: E0513 00:49:39.524041 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.524206 kubelet[2195]: E0513 00:49:39.524189 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.524206 kubelet[2195]: W0513 00:49:39.524200 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.524308 kubelet[2195]: E0513 00:49:39.524296 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.524453 kubelet[2195]: E0513 00:49:39.524441 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.524453 kubelet[2195]: W0513 00:49:39.524451 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.524580 kubelet[2195]: E0513 00:49:39.524561 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.524712 kubelet[2195]: E0513 00:49:39.524701 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.524712 kubelet[2195]: W0513 00:49:39.524708 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.524807 kubelet[2195]: E0513 00:49:39.524794 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.524931 kubelet[2195]: E0513 00:49:39.524913 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.524931 kubelet[2195]: W0513 00:49:39.524927 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.524931 kubelet[2195]: E0513 00:49:39.524936 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.525043 kubelet[2195]: I0513 00:49:39.524953 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/43f79210-2931-4b10-89eb-d5d1daf62487-socket-dir\") pod \"csi-node-driver-7pn4l\" (UID: \"43f79210-2931-4b10-89eb-d5d1daf62487\") " pod="calico-system/csi-node-driver-7pn4l" May 13 00:49:39.525166 kubelet[2195]: E0513 00:49:39.525151 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.525166 kubelet[2195]: W0513 00:49:39.525161 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.525244 kubelet[2195]: E0513 00:49:39.525170 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.525390 kubelet[2195]: E0513 00:49:39.525378 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.525441 kubelet[2195]: W0513 00:49:39.525391 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.525441 kubelet[2195]: E0513 00:49:39.525400 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.525577 kubelet[2195]: E0513 00:49:39.525566 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.525577 kubelet[2195]: W0513 00:49:39.525573 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.525659 kubelet[2195]: E0513 00:49:39.525648 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.525800 kubelet[2195]: E0513 00:49:39.525789 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.525800 kubelet[2195]: W0513 00:49:39.525798 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.525890 kubelet[2195]: E0513 00:49:39.525881 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.526025 kubelet[2195]: E0513 00:49:39.526014 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.526025 kubelet[2195]: W0513 00:49:39.526020 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.526120 kubelet[2195]: E0513 00:49:39.526108 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.526493 kubelet[2195]: E0513 00:49:39.526404 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.526493 kubelet[2195]: W0513 00:49:39.526412 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.526493 kubelet[2195]: E0513 00:49:39.526422 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.526763 kubelet[2195]: E0513 00:49:39.526752 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.526763 kubelet[2195]: W0513 00:49:39.526761 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.526847 kubelet[2195]: E0513 00:49:39.526769 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.526961 kubelet[2195]: E0513 00:49:39.526951 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.527009 kubelet[2195]: W0513 00:49:39.526969 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.527009 kubelet[2195]: E0513 00:49:39.526979 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.527218 kubelet[2195]: E0513 00:49:39.527147 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.527218 kubelet[2195]: W0513 00:49:39.527155 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.527218 kubelet[2195]: E0513 00:49:39.527160 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.527631 kubelet[2195]: E0513 00:49:39.527618 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.527631 kubelet[2195]: W0513 00:49:39.527627 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.527737 kubelet[2195]: E0513 00:49:39.527727 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.528080 kubelet[2195]: E0513 00:49:39.528049 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.528080 kubelet[2195]: W0513 00:49:39.528058 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.528272 kubelet[2195]: E0513 00:49:39.528256 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.528272 kubelet[2195]: W0513 00:49:39.528268 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.528467 kubelet[2195]: E0513 00:49:39.528451 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.528467 kubelet[2195]: W0513 00:49:39.528463 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.528540 kubelet[2195]: E0513 00:49:39.528474 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.528644 kubelet[2195]: E0513 00:49:39.528627 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.528644 kubelet[2195]: W0513 00:49:39.528639 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.528726 kubelet[2195]: E0513 00:49:39.528646 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.528726 kubelet[2195]: E0513 00:49:39.528658 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.528869 kubelet[2195]: E0513 00:49:39.528855 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.528869 kubelet[2195]: W0513 00:49:39.528864 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.528869 kubelet[2195]: E0513 00:49:39.528869 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.529036 kubelet[2195]: E0513 00:49:39.529022 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.529036 kubelet[2195]: W0513 00:49:39.529031 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.529036 kubelet[2195]: E0513 00:49:39.529036 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.529107 kubelet[2195]: E0513 00:49:39.529050 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.529187 kubelet[2195]: E0513 00:49:39.529174 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.529187 kubelet[2195]: W0513 00:49:39.529184 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.529235 kubelet[2195]: E0513 00:49:39.529190 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.529317 kubelet[2195]: E0513 00:49:39.529305 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.529317 kubelet[2195]: W0513 00:49:39.529314 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.529399 kubelet[2195]: E0513 00:49:39.529322 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.529399 kubelet[2195]: I0513 00:49:39.529367 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/43f79210-2931-4b10-89eb-d5d1daf62487-registration-dir\") pod \"csi-node-driver-7pn4l\" (UID: \"43f79210-2931-4b10-89eb-d5d1daf62487\") " pod="calico-system/csi-node-driver-7pn4l" May 13 00:49:39.529503 kubelet[2195]: E0513 00:49:39.529489 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.529503 kubelet[2195]: W0513 00:49:39.529498 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.529554 kubelet[2195]: E0513 00:49:39.529504 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.529554 kubelet[2195]: I0513 00:49:39.529513 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8r6vf\" (UniqueName: \"kubernetes.io/projected/43f79210-2931-4b10-89eb-d5d1daf62487-kube-api-access-8r6vf\") pod \"csi-node-driver-7pn4l\" (UID: \"43f79210-2931-4b10-89eb-d5d1daf62487\") " pod="calico-system/csi-node-driver-7pn4l" May 13 00:49:39.529647 kubelet[2195]: E0513 00:49:39.529636 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.529647 kubelet[2195]: W0513 00:49:39.529644 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.529700 kubelet[2195]: E0513 00:49:39.529649 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.529778 kubelet[2195]: E0513 00:49:39.529767 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.529778 kubelet[2195]: W0513 00:49:39.529776 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.529847 kubelet[2195]: E0513 00:49:39.529782 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.529925 kubelet[2195]: E0513 00:49:39.529914 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.529925 kubelet[2195]: W0513 00:49:39.529922 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.530026 kubelet[2195]: E0513 00:49:39.529927 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.530159 kubelet[2195]: E0513 00:49:39.530149 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.530159 kubelet[2195]: W0513 00:49:39.530156 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.530221 kubelet[2195]: E0513 00:49:39.530165 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.530645 env[1255]: time="2025-05-13T00:49:39.530618393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b48cbb896-4b8cb,Uid:3b87c2f6-ed1b-49e8-99ac-bed93f062483,Namespace:calico-system,Attempt:0,}" May 13 00:49:39.530944 kubelet[2195]: E0513 00:49:39.530933 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.530944 kubelet[2195]: W0513 00:49:39.530942 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.531040 kubelet[2195]: E0513 00:49:39.530952 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.531162 kubelet[2195]: E0513 00:49:39.531149 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.531162 kubelet[2195]: W0513 00:49:39.531156 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.531248 kubelet[2195]: E0513 00:49:39.531239 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.531406 kubelet[2195]: E0513 00:49:39.531396 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.531406 kubelet[2195]: W0513 00:49:39.531403 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.531494 kubelet[2195]: E0513 00:49:39.531485 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.531606 kubelet[2195]: E0513 00:49:39.531596 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.531651 kubelet[2195]: W0513 00:49:39.531608 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.531696 kubelet[2195]: E0513 00:49:39.531688 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.531806 kubelet[2195]: E0513 00:49:39.531797 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.531852 kubelet[2195]: W0513 00:49:39.531804 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.534551 kubelet[2195]: E0513 00:49:39.534538 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.535163 kubelet[2195]: E0513 00:49:39.535144 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.535163 kubelet[2195]: W0513 00:49:39.535154 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.535250 kubelet[2195]: E0513 00:49:39.535242 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.535503 kubelet[2195]: E0513 00:49:39.535493 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.535543 kubelet[2195]: W0513 00:49:39.535506 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.535597 kubelet[2195]: E0513 00:49:39.535587 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.535597 kubelet[2195]: W0513 00:49:39.535593 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.535672 kubelet[2195]: E0513 00:49:39.535664 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.535721 kubelet[2195]: E0513 00:49:39.535696 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.535792 kubelet[2195]: W0513 00:49:39.535784 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.535854 kubelet[2195]: E0513 00:49:39.535700 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.535901 kubelet[2195]: E0513 00:49:39.535893 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.536447 kubelet[2195]: E0513 00:49:39.536439 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.536506 kubelet[2195]: W0513 00:49:39.536498 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.536560 kubelet[2195]: E0513 00:49:39.536552 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.536712 kubelet[2195]: E0513 00:49:39.536706 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.536772 kubelet[2195]: W0513 00:49:39.536765 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.536823 kubelet[2195]: E0513 00:49:39.536815 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.536915 kubelet[2195]: E0513 00:49:39.536905 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.536915 kubelet[2195]: W0513 00:49:39.536913 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.536982 kubelet[2195]: E0513 00:49:39.536922 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537015 kubelet[2195]: E0513 00:49:39.537005 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537015 kubelet[2195]: W0513 00:49:39.537011 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.537066 kubelet[2195]: E0513 00:49:39.537017 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537140 kubelet[2195]: E0513 00:49:39.537129 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537180 kubelet[2195]: W0513 00:49:39.537141 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.537180 kubelet[2195]: E0513 00:49:39.537147 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537230 kubelet[2195]: E0513 00:49:39.537218 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537230 kubelet[2195]: W0513 00:49:39.537224 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.537230 kubelet[2195]: E0513 00:49:39.537229 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537310 kubelet[2195]: E0513 00:49:39.537302 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537310 kubelet[2195]: W0513 00:49:39.537309 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.537373 kubelet[2195]: E0513 00:49:39.537317 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537467 kubelet[2195]: E0513 00:49:39.537452 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537467 kubelet[2195]: W0513 00:49:39.537459 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.537467 kubelet[2195]: E0513 00:49:39.537464 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537560 kubelet[2195]: E0513 00:49:39.537552 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537560 kubelet[2195]: W0513 00:49:39.537558 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.537623 kubelet[2195]: E0513 00:49:39.537566 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537677 kubelet[2195]: E0513 00:49:39.537668 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537677 kubelet[2195]: W0513 00:49:39.537675 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.537745 kubelet[2195]: E0513 00:49:39.537681 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537791 kubelet[2195]: E0513 00:49:39.537781 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537828 kubelet[2195]: W0513 00:49:39.537807 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.537870 kubelet[2195]: E0513 00:49:39.537861 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.537971 kubelet[2195]: E0513 00:49:39.537897 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.537971 kubelet[2195]: W0513 00:49:39.537968 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.538059 kubelet[2195]: E0513 00:49:39.538049 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.538059 kubelet[2195]: W0513 00:49:39.538054 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.538106 kubelet[2195]: E0513 00:49:39.538060 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.538106 kubelet[2195]: E0513 00:49:39.538074 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.538160 kubelet[2195]: E0513 00:49:39.538150 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.538160 kubelet[2195]: W0513 00:49:39.538157 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.538210 kubelet[2195]: E0513 00:49:39.538161 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.538293 kubelet[2195]: E0513 00:49:39.538278 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.538293 kubelet[2195]: W0513 00:49:39.538286 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.538399 kubelet[2195]: E0513 00:49:39.538303 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.538799 kubelet[2195]: E0513 00:49:39.538791 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.538855 kubelet[2195]: W0513 00:49:39.538847 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.538903 kubelet[2195]: E0513 00:49:39.538895 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.546724 kubelet[2195]: E0513 00:49:39.546491 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.546724 kubelet[2195]: W0513 00:49:39.546508 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.546724 kubelet[2195]: E0513 00:49:39.546521 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.565074 env[1255]: time="2025-05-13T00:49:39.564929988Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:49:39.565074 env[1255]: time="2025-05-13T00:49:39.564963050Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:49:39.565074 env[1255]: time="2025-05-13T00:49:39.564973837Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:49:39.565320 env[1255]: time="2025-05-13T00:49:39.565269111Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e398286449d2cf5ff1b1c0c50764f1e904f06f55d5e50e7c569d268ef16fb0d7 pid=2636 runtime=io.containerd.runc.v2 May 13 00:49:39.573612 systemd[1]: Started cri-containerd-e398286449d2cf5ff1b1c0c50764f1e904f06f55d5e50e7c569d268ef16fb0d7.scope. May 13 00:49:39.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.583000 audit: BPF prog-id=115 op=LOAD May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393832383634343964326366356666316231633063353037363466 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393832383634343964326366356666316231633063353037363466 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit: BPF prog-id=116 op=LOAD May 13 00:49:39.584000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002cdeb0 items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393832383634343964326366356666316231633063353037363466 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit: BPF prog-id=117 op=LOAD May 13 00:49:39.584000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002cdef8 items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393832383634343964326366356666316231633063353037363466 May 13 00:49:39.584000 audit: BPF prog-id=117 op=UNLOAD May 13 00:49:39.584000 audit: BPF prog-id=116 op=UNLOAD May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.584000 audit: BPF prog-id=118 op=LOAD May 13 00:49:39.584000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003c0308 items=0 ppid=2636 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393832383634343964326366356666316231633063353037363466 May 13 00:49:39.599312 env[1255]: time="2025-05-13T00:49:39.599286721Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r82xd,Uid:9dcdc7e2-e7b4-42e4-9d52-f320a416aae8,Namespace:calico-system,Attempt:0,}" May 13 00:49:39.612259 env[1255]: time="2025-05-13T00:49:39.612234065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b48cbb896-4b8cb,Uid:3b87c2f6-ed1b-49e8-99ac-bed93f062483,Namespace:calico-system,Attempt:0,} returns sandbox id \"e398286449d2cf5ff1b1c0c50764f1e904f06f55d5e50e7c569d268ef16fb0d7\"" May 13 00:49:39.613416 env[1255]: time="2025-05-13T00:49:39.613403382Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 13 00:49:39.613821 env[1255]: time="2025-05-13T00:49:39.613774299Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:49:39.613902 env[1255]: time="2025-05-13T00:49:39.613888086Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:49:39.614013 env[1255]: time="2025-05-13T00:49:39.613998404Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:49:39.614428 env[1255]: time="2025-05-13T00:49:39.614400560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5 pid=2671 runtime=io.containerd.runc.v2 May 13 00:49:39.622567 systemd[1]: Started cri-containerd-db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5.scope. May 13 00:49:39.630682 kubelet[2195]: E0513 00:49:39.630589 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.630682 kubelet[2195]: W0513 00:49:39.630604 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.630682 kubelet[2195]: E0513 00:49:39.630616 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.630927 kubelet[2195]: E0513 00:49:39.630860 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.630927 kubelet[2195]: W0513 00:49:39.630865 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.630927 kubelet[2195]: E0513 00:49:39.630873 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.631113 kubelet[2195]: E0513 00:49:39.631045 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.631113 kubelet[2195]: W0513 00:49:39.631051 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.631113 kubelet[2195]: E0513 00:49:39.631057 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.631280 kubelet[2195]: E0513 00:49:39.631214 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.631280 kubelet[2195]: W0513 00:49:39.631220 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.631280 kubelet[2195]: E0513 00:49:39.631226 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.631454 kubelet[2195]: E0513 00:49:39.631384 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.631454 kubelet[2195]: W0513 00:49:39.631390 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.631454 kubelet[2195]: E0513 00:49:39.631396 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.631609 kubelet[2195]: E0513 00:49:39.631552 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.631609 kubelet[2195]: W0513 00:49:39.631557 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.631609 kubelet[2195]: E0513 00:49:39.631564 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.631767 kubelet[2195]: E0513 00:49:39.631713 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.631767 kubelet[2195]: W0513 00:49:39.631718 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.631767 kubelet[2195]: E0513 00:49:39.631725 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.631976 kubelet[2195]: E0513 00:49:39.631882 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.631976 kubelet[2195]: W0513 00:49:39.631889 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.631976 kubelet[2195]: E0513 00:49:39.631896 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.632138 kubelet[2195]: E0513 00:49:39.632069 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.632138 kubelet[2195]: W0513 00:49:39.632074 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.632138 kubelet[2195]: E0513 00:49:39.632115 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.632292 kubelet[2195]: E0513 00:49:39.632232 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.632292 kubelet[2195]: W0513 00:49:39.632238 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.632292 kubelet[2195]: E0513 00:49:39.632277 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.632469 kubelet[2195]: E0513 00:49:39.632410 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.632469 kubelet[2195]: W0513 00:49:39.632415 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.632469 kubelet[2195]: E0513 00:49:39.632422 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.632638 kubelet[2195]: E0513 00:49:39.632581 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.632638 kubelet[2195]: W0513 00:49:39.632586 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.632638 kubelet[2195]: E0513 00:49:39.632629 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.632786 kubelet[2195]: E0513 00:49:39.632729 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.632786 kubelet[2195]: W0513 00:49:39.632734 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.632786 kubelet[2195]: E0513 00:49:39.632774 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.632931 kubelet[2195]: E0513 00:49:39.632874 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.632931 kubelet[2195]: W0513 00:49:39.632879 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.632931 kubelet[2195]: E0513 00:49:39.632918 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.633077 kubelet[2195]: E0513 00:49:39.633027 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.633077 kubelet[2195]: W0513 00:49:39.633032 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.633077 kubelet[2195]: E0513 00:49:39.633039 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.633257 kubelet[2195]: E0513 00:49:39.633181 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.633257 kubelet[2195]: W0513 00:49:39.633186 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.633257 kubelet[2195]: E0513 00:49:39.633193 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.633439 kubelet[2195]: E0513 00:49:39.633380 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.633439 kubelet[2195]: W0513 00:49:39.633386 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.633439 kubelet[2195]: E0513 00:49:39.633391 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.633595 kubelet[2195]: E0513 00:49:39.633530 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.633595 kubelet[2195]: W0513 00:49:39.633536 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.633595 kubelet[2195]: E0513 00:49:39.633543 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.633884 kubelet[2195]: E0513 00:49:39.633698 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.633884 kubelet[2195]: W0513 00:49:39.633703 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.633884 kubelet[2195]: E0513 00:49:39.633711 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.634035 kubelet[2195]: E0513 00:49:39.633980 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.634035 kubelet[2195]: W0513 00:49:39.633986 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.634035 kubelet[2195]: E0513 00:49:39.633994 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.634908 kubelet[2195]: E0513 00:49:39.634146 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.634908 kubelet[2195]: W0513 00:49:39.634152 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.634908 kubelet[2195]: E0513 00:49:39.634195 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.634908 kubelet[2195]: E0513 00:49:39.634648 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.634908 kubelet[2195]: W0513 00:49:39.634654 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.634908 kubelet[2195]: E0513 00:49:39.634661 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.634908 kubelet[2195]: E0513 00:49:39.634768 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.634908 kubelet[2195]: W0513 00:49:39.634774 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.634908 kubelet[2195]: E0513 00:49:39.634782 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.634908 kubelet[2195]: E0513 00:49:39.634882 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.635185 kubelet[2195]: W0513 00:49:39.634886 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.635185 kubelet[2195]: E0513 00:49:39.634892 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.636000 audit: BPF prog-id=119 op=LOAD May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2671 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373630313433643334333162316261633561313965656166663862 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2671 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373630313433643334333162316261633561313965656166663862 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit: BPF prog-id=120 op=LOAD May 13 00:49:39.637000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00018de10 items=0 ppid=2671 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373630313433643334333162316261633561313965656166663862 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit: BPF prog-id=121 op=LOAD May 13 00:49:39.637000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00018de58 items=0 ppid=2671 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373630313433643334333162316261633561313965656166663862 May 13 00:49:39.637000 audit: BPF prog-id=121 op=UNLOAD May 13 00:49:39.637000 audit: BPF prog-id=120 op=UNLOAD May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:39.637000 audit: BPF prog-id=122 op=LOAD May 13 00:49:39.637000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001d0268 items=0 ppid=2671 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:39.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373630313433643334333162316261633561313965656166663862 May 13 00:49:39.640127 kubelet[2195]: E0513 00:49:39.640046 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.640127 kubelet[2195]: W0513 00:49:39.640057 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.640127 kubelet[2195]: E0513 00:49:39.640070 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.642714 kubelet[2195]: E0513 00:49:39.642671 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:39.642714 kubelet[2195]: W0513 00:49:39.642681 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:39.642714 kubelet[2195]: E0513 00:49:39.642692 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:39.650808 env[1255]: time="2025-05-13T00:49:39.650781936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r82xd,Uid:9dcdc7e2-e7b4-42e4-9d52-f320a416aae8,Namespace:calico-system,Attempt:0,} returns sandbox id \"db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5\"" May 13 00:49:40.118000 audit[2737]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:40.118000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffe40bf39f0 a2=0 a3=7ffe40bf39dc items=0 ppid=2331 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:40.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:40.123000 audit[2737]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:40.123000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe40bf39f0 a2=0 a3=0 items=0 ppid=2331 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:40.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:41.512112 kubelet[2195]: E0513 00:49:41.511826 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7pn4l" podUID="43f79210-2931-4b10-89eb-d5d1daf62487" May 13 00:49:41.607755 env[1255]: time="2025-05-13T00:49:41.607726620Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:41.608921 env[1255]: time="2025-05-13T00:49:41.608908399Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:41.610377 env[1255]: time="2025-05-13T00:49:41.610360343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:41.610982 env[1255]: time="2025-05-13T00:49:41.610968385Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:41.611324 env[1255]: time="2025-05-13T00:49:41.611309182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 13 00:49:41.612485 env[1255]: time="2025-05-13T00:49:41.612214660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 00:49:41.622441 env[1255]: time="2025-05-13T00:49:41.622398054Z" level=info msg="CreateContainer within sandbox \"e398286449d2cf5ff1b1c0c50764f1e904f06f55d5e50e7c569d268ef16fb0d7\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 13 00:49:41.628292 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4216712235.mount: Deactivated successfully. May 13 00:49:41.644405 env[1255]: time="2025-05-13T00:49:41.644366914Z" level=info msg="CreateContainer within sandbox \"e398286449d2cf5ff1b1c0c50764f1e904f06f55d5e50e7c569d268ef16fb0d7\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"9cfedc0f8a067aec8e92e041e9a00fe22ad46ad54d226bdabbbcdcea69fd7f01\"" May 13 00:49:41.645475 env[1255]: time="2025-05-13T00:49:41.645454322Z" level=info msg="StartContainer for \"9cfedc0f8a067aec8e92e041e9a00fe22ad46ad54d226bdabbbcdcea69fd7f01\"" May 13 00:49:41.665140 systemd[1]: Started cri-containerd-9cfedc0f8a067aec8e92e041e9a00fe22ad46ad54d226bdabbbcdcea69fd7f01.scope. May 13 00:49:41.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.675000 audit: BPF prog-id=123 op=LOAD May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2636 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:41.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666564633066386130363761656338653932653034316539613030 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2636 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:41.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666564633066386130363761656338653932653034316539613030 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit: BPF prog-id=124 op=LOAD May 13 00:49:41.676000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c63c0 items=0 ppid=2636 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:41.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666564633066386130363761656338653932653034316539613030 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit: BPF prog-id=125 op=LOAD May 13 00:49:41.676000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c6408 items=0 ppid=2636 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:41.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666564633066386130363761656338653932653034316539613030 May 13 00:49:41.676000 audit: BPF prog-id=125 op=UNLOAD May 13 00:49:41.676000 audit: BPF prog-id=124 op=UNLOAD May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:41.676000 audit: BPF prog-id=126 op=LOAD May 13 00:49:41.676000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c6818 items=0 ppid=2636 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:41.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666564633066386130363761656338653932653034316539613030 May 13 00:49:41.706061 env[1255]: time="2025-05-13T00:49:41.706023550Z" level=info msg="StartContainer for \"9cfedc0f8a067aec8e92e041e9a00fe22ad46ad54d226bdabbbcdcea69fd7f01\" returns successfully" May 13 00:49:42.687778 kubelet[2195]: I0513 00:49:42.687749 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6b48cbb896-4b8cb" podStartSLOduration=1.68902139 podStartE2EDuration="3.687739501s" podCreationTimestamp="2025-05-13 00:49:39 +0000 UTC" firstStartedPulling="2025-05-13 00:49:39.613108164 +0000 UTC m=+17.378162588" lastFinishedPulling="2025-05-13 00:49:41.611826276 +0000 UTC m=+19.376880699" observedRunningTime="2025-05-13 00:49:42.687401334 +0000 UTC m=+20.452455766" watchObservedRunningTime="2025-05-13 00:49:42.687739501 +0000 UTC m=+20.452793927" May 13 00:49:42.751241 kubelet[2195]: E0513 00:49:42.751222 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.751367 kubelet[2195]: W0513 00:49:42.751355 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.751425 kubelet[2195]: E0513 00:49:42.751415 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.751575 kubelet[2195]: E0513 00:49:42.751568 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.751620 kubelet[2195]: W0513 00:49:42.751612 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.751669 kubelet[2195]: E0513 00:49:42.751661 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.751796 kubelet[2195]: E0513 00:49:42.751789 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.751848 kubelet[2195]: W0513 00:49:42.751839 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.751899 kubelet[2195]: E0513 00:49:42.751891 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.752033 kubelet[2195]: E0513 00:49:42.752027 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.752080 kubelet[2195]: W0513 00:49:42.752072 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.752127 kubelet[2195]: E0513 00:49:42.752119 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.752258 kubelet[2195]: E0513 00:49:42.752252 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.752306 kubelet[2195]: W0513 00:49:42.752298 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.752361 kubelet[2195]: E0513 00:49:42.752353 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.752506 kubelet[2195]: E0513 00:49:42.752498 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.752554 kubelet[2195]: W0513 00:49:42.752546 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.752602 kubelet[2195]: E0513 00:49:42.752594 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.752728 kubelet[2195]: E0513 00:49:42.752722 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.752774 kubelet[2195]: W0513 00:49:42.752766 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.752821 kubelet[2195]: E0513 00:49:42.752813 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.752958 kubelet[2195]: E0513 00:49:42.752952 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.753004 kubelet[2195]: W0513 00:49:42.752996 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.753048 kubelet[2195]: E0513 00:49:42.753040 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.753175 kubelet[2195]: E0513 00:49:42.753169 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.753221 kubelet[2195]: W0513 00:49:42.753213 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.753268 kubelet[2195]: E0513 00:49:42.753260 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.753407 kubelet[2195]: E0513 00:49:42.753400 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.753455 kubelet[2195]: W0513 00:49:42.753447 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.753501 kubelet[2195]: E0513 00:49:42.753494 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.753624 kubelet[2195]: E0513 00:49:42.753617 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.753670 kubelet[2195]: W0513 00:49:42.753662 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.753745 kubelet[2195]: E0513 00:49:42.753737 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.753875 kubelet[2195]: E0513 00:49:42.753868 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.753920 kubelet[2195]: W0513 00:49:42.753912 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.753966 kubelet[2195]: E0513 00:49:42.753959 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.754096 kubelet[2195]: E0513 00:49:42.754089 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.754141 kubelet[2195]: W0513 00:49:42.754133 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.754188 kubelet[2195]: E0513 00:49:42.754180 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.754317 kubelet[2195]: E0513 00:49:42.754310 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.754377 kubelet[2195]: W0513 00:49:42.754369 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.754421 kubelet[2195]: E0513 00:49:42.754413 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.754545 kubelet[2195]: E0513 00:49:42.754538 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.754590 kubelet[2195]: W0513 00:49:42.754582 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.754638 kubelet[2195]: E0513 00:49:42.754631 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.852211 kubelet[2195]: E0513 00:49:42.852191 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.852316 kubelet[2195]: W0513 00:49:42.852305 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.852394 kubelet[2195]: E0513 00:49:42.852384 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.852617 kubelet[2195]: E0513 00:49:42.852608 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.852669 kubelet[2195]: W0513 00:49:42.852660 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.852719 kubelet[2195]: E0513 00:49:42.852711 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.852883 kubelet[2195]: E0513 00:49:42.852870 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.852931 kubelet[2195]: W0513 00:49:42.852922 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.852981 kubelet[2195]: E0513 00:49:42.852973 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.853128 kubelet[2195]: E0513 00:49:42.853122 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.853175 kubelet[2195]: W0513 00:49:42.853167 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.853228 kubelet[2195]: E0513 00:49:42.853220 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.853366 kubelet[2195]: E0513 00:49:42.853360 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.853414 kubelet[2195]: W0513 00:49:42.853406 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.853470 kubelet[2195]: E0513 00:49:42.853462 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.853591 kubelet[2195]: E0513 00:49:42.853585 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.853636 kubelet[2195]: W0513 00:49:42.853628 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.853702 kubelet[2195]: E0513 00:49:42.853687 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.853811 kubelet[2195]: E0513 00:49:42.853805 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.853857 kubelet[2195]: W0513 00:49:42.853849 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.853915 kubelet[2195]: E0513 00:49:42.853904 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.854035 kubelet[2195]: E0513 00:49:42.854030 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.854081 kubelet[2195]: W0513 00:49:42.854073 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.854134 kubelet[2195]: E0513 00:49:42.854126 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.854310 kubelet[2195]: E0513 00:49:42.854299 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.854310 kubelet[2195]: W0513 00:49:42.854307 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.854381 kubelet[2195]: E0513 00:49:42.854317 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.854498 kubelet[2195]: E0513 00:49:42.854491 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.854545 kubelet[2195]: W0513 00:49:42.854537 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.854596 kubelet[2195]: E0513 00:49:42.854587 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.854722 kubelet[2195]: E0513 00:49:42.854716 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.854771 kubelet[2195]: W0513 00:49:42.854763 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.854821 kubelet[2195]: E0513 00:49:42.854813 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.854953 kubelet[2195]: E0513 00:49:42.854943 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.854953 kubelet[2195]: W0513 00:49:42.854950 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.855013 kubelet[2195]: E0513 00:49:42.854959 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.855062 kubelet[2195]: E0513 00:49:42.855050 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.855062 kubelet[2195]: W0513 00:49:42.855058 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.855123 kubelet[2195]: E0513 00:49:42.855066 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.855162 kubelet[2195]: E0513 00:49:42.855150 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.855162 kubelet[2195]: W0513 00:49:42.855158 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.855222 kubelet[2195]: E0513 00:49:42.855163 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.855309 kubelet[2195]: E0513 00:49:42.855300 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.855309 kubelet[2195]: W0513 00:49:42.855307 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.855386 kubelet[2195]: E0513 00:49:42.855315 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.855419 kubelet[2195]: E0513 00:49:42.855409 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.855419 kubelet[2195]: W0513 00:49:42.855415 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.855470 kubelet[2195]: E0513 00:49:42.855421 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.855509 kubelet[2195]: E0513 00:49:42.855496 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.855509 kubelet[2195]: W0513 00:49:42.855503 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.855509 kubelet[2195]: E0513 00:49:42.855509 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:42.855695 kubelet[2195]: E0513 00:49:42.855685 2195 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 00:49:42.855695 kubelet[2195]: W0513 00:49:42.855694 2195 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 00:49:42.855746 kubelet[2195]: E0513 00:49:42.855700 2195 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 00:49:43.229208 env[1255]: time="2025-05-13T00:49:43.229177228Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:43.230055 env[1255]: time="2025-05-13T00:49:43.230039144Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:43.230848 env[1255]: time="2025-05-13T00:49:43.230835723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:43.231428 env[1255]: time="2025-05-13T00:49:43.231403549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:43.231896 env[1255]: time="2025-05-13T00:49:43.231876684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 00:49:43.233112 env[1255]: time="2025-05-13T00:49:43.233098122Z" level=info msg="CreateContainer within sandbox \"db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 00:49:43.239387 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1533395773.mount: Deactivated successfully. May 13 00:49:43.240978 env[1255]: time="2025-05-13T00:49:43.240954855Z" level=info msg="CreateContainer within sandbox \"db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c39895670e9db53ae690a6cac5c2d37161965cb96fdeac3e88ac89f498262af8\"" May 13 00:49:43.241922 env[1255]: time="2025-05-13T00:49:43.241402561Z" level=info msg="StartContainer for \"c39895670e9db53ae690a6cac5c2d37161965cb96fdeac3e88ac89f498262af8\"" May 13 00:49:43.253580 systemd[1]: Started cri-containerd-c39895670e9db53ae690a6cac5c2d37161965cb96fdeac3e88ac89f498262af8.scope. May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6f38245358 items=0 ppid=2671 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:43.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393839353637306539646235336165363930613663616335633264 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit: BPF prog-id=127 op=LOAD May 13 00:49:43.270000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002937e8 items=0 ppid=2671 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:43.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393839353637306539646235336165363930613663616335633264 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit: BPF prog-id=128 op=LOAD May 13 00:49:43.270000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000293838 items=0 ppid=2671 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:43.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393839353637306539646235336165363930613663616335633264 May 13 00:49:43.270000 audit: BPF prog-id=128 op=UNLOAD May 13 00:49:43.270000 audit: BPF prog-id=127 op=UNLOAD May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:43.270000 audit: BPF prog-id=129 op=LOAD May 13 00:49:43.270000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002938c8 items=0 ppid=2671 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:43.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393839353637306539646235336165363930613663616335633264 May 13 00:49:43.286483 systemd[1]: cri-containerd-c39895670e9db53ae690a6cac5c2d37161965cb96fdeac3e88ac89f498262af8.scope: Deactivated successfully. May 13 00:49:43.290000 audit: BPF prog-id=129 op=UNLOAD May 13 00:49:43.341075 env[1255]: time="2025-05-13T00:49:43.341048985Z" level=info msg="StartContainer for \"c39895670e9db53ae690a6cac5c2d37161965cb96fdeac3e88ac89f498262af8\" returns successfully" May 13 00:49:43.469735 env[1255]: time="2025-05-13T00:49:43.469697634Z" level=info msg="shim disconnected" id=c39895670e9db53ae690a6cac5c2d37161965cb96fdeac3e88ac89f498262af8 May 13 00:49:43.469735 env[1255]: time="2025-05-13T00:49:43.469731219Z" level=warning msg="cleaning up after shim disconnected" id=c39895670e9db53ae690a6cac5c2d37161965cb96fdeac3e88ac89f498262af8 namespace=k8s.io May 13 00:49:43.469735 env[1255]: time="2025-05-13T00:49:43.469738675Z" level=info msg="cleaning up dead shim" May 13 00:49:43.473997 env[1255]: time="2025-05-13T00:49:43.473971425Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:49:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2858 runtime=io.containerd.runc.v2\n" May 13 00:49:43.512434 kubelet[2195]: E0513 00:49:43.512135 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7pn4l" podUID="43f79210-2931-4b10-89eb-d5d1daf62487" May 13 00:49:43.615947 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c39895670e9db53ae690a6cac5c2d37161965cb96fdeac3e88ac89f498262af8-rootfs.mount: Deactivated successfully. May 13 00:49:43.685392 kubelet[2195]: I0513 00:49:43.684770 2195 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:49:43.685876 env[1255]: time="2025-05-13T00:49:43.685854920Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 00:49:45.511674 kubelet[2195]: E0513 00:49:45.511644 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7pn4l" podUID="43f79210-2931-4b10-89eb-d5d1daf62487" May 13 00:49:47.476199 env[1255]: time="2025-05-13T00:49:47.476169364Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:47.478484 env[1255]: time="2025-05-13T00:49:47.478470979Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:47.479889 env[1255]: time="2025-05-13T00:49:47.479871055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:47.480620 env[1255]: time="2025-05-13T00:49:47.480607257Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:47.480945 env[1255]: time="2025-05-13T00:49:47.480926752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 00:49:47.483070 env[1255]: time="2025-05-13T00:49:47.483045167Z" level=info msg="CreateContainer within sandbox \"db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 00:49:47.507926 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1091306238.mount: Deactivated successfully. May 13 00:49:47.512158 kubelet[2195]: E0513 00:49:47.512135 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7pn4l" podUID="43f79210-2931-4b10-89eb-d5d1daf62487" May 13 00:49:47.524631 env[1255]: time="2025-05-13T00:49:47.524606773Z" level=info msg="CreateContainer within sandbox \"db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7d38f00d4f89d15164efe4c99f3f97d75f97d91fbcd021a7778b2e6ece657779\"" May 13 00:49:47.525497 env[1255]: time="2025-05-13T00:49:47.525484223Z" level=info msg="StartContainer for \"7d38f00d4f89d15164efe4c99f3f97d75f97d91fbcd021a7778b2e6ece657779\"" May 13 00:49:47.548393 systemd[1]: Started cri-containerd-7d38f00d4f89d15164efe4c99f3f97d75f97d91fbcd021a7778b2e6ece657779.scope. May 13 00:49:47.568000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.570012 kernel: kauditd_printk_skb: 223 callbacks suppressed May 13 00:49:47.570054 kernel: audit: type=1400 audit(1747097387.568:995): avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.568000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fdee1b02198 items=0 ppid=2671 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:47.576118 kernel: audit: type=1300 audit(1747097387.568:995): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fdee1b02198 items=0 ppid=2671 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:47.576158 kernel: audit: type=1327 audit(1747097387.568:995): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333866303064346638396431353136346566653463393966336639 May 13 00:49:47.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333866303064346638396431353136346566653463393966336639 May 13 00:49:47.579558 kernel: audit: type=1400 audit(1747097387.569:996): avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.584431 kernel: audit: type=1400 audit(1747097387.569:996): avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.584465 kernel: audit: type=1400 audit(1747097387.569:996): avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.589082 kernel: audit: type=1400 audit(1747097387.569:996): avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.589116 kernel: audit: type=1400 audit(1747097387.569:996): avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.593698 kernel: audit: type=1400 audit(1747097387.569:996): avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.596176 kernel: audit: type=1400 audit(1747097387.569:996): avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.569000 audit: BPF prog-id=130 op=LOAD May 13 00:49:47.569000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0002cdc88 items=0 ppid=2671 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:47.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333866303064346638396431353136346566653463393966336639 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.575000 audit: BPF prog-id=131 op=LOAD May 13 00:49:47.575000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0002cdcd8 items=0 ppid=2671 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:47.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333866303064346638396431353136346566653463393966336639 May 13 00:49:47.581000 audit: BPF prog-id=131 op=UNLOAD May 13 00:49:47.581000 audit: BPF prog-id=130 op=UNLOAD May 13 00:49:47.581000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { perfmon } for pid=2884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit[2884]: AVC avc: denied { bpf } for pid=2884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:47.581000 audit: BPF prog-id=132 op=LOAD May 13 00:49:47.581000 audit[2884]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0002cdd68 items=0 ppid=2671 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764333866303064346638396431353136346566653463393966336639 May 13 00:49:47.603784 env[1255]: time="2025-05-13T00:49:47.603756845Z" level=info msg="StartContainer for \"7d38f00d4f89d15164efe4c99f3f97d75f97d91fbcd021a7778b2e6ece657779\" returns successfully" May 13 00:49:48.859976 env[1255]: time="2025-05-13T00:49:48.859903560Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 13 00:49:48.861435 systemd[1]: cri-containerd-7d38f00d4f89d15164efe4c99f3f97d75f97d91fbcd021a7778b2e6ece657779.scope: Deactivated successfully. May 13 00:49:48.864000 audit: BPF prog-id=132 op=UNLOAD May 13 00:49:48.873463 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7d38f00d4f89d15164efe4c99f3f97d75f97d91fbcd021a7778b2e6ece657779-rootfs.mount: Deactivated successfully. May 13 00:49:48.877046 kubelet[2195]: I0513 00:49:48.877029 2195 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 13 00:49:49.063937 kubelet[2195]: I0513 00:49:49.063908 2195 topology_manager.go:215] "Topology Admit Handler" podUID="b32c0982-4af4-4a32-bebb-0f2cccf5d98b" podNamespace="kube-system" podName="coredns-7db6d8ff4d-9zwh9" May 13 00:49:49.112813 kubelet[2195]: I0513 00:49:49.112738 2195 topology_manager.go:215] "Topology Admit Handler" podUID="770c6e58-a9b2-4d68-8a22-9c0e004bf992" podNamespace="calico-apiserver" podName="calico-apiserver-5654474c45-m4qdr" May 13 00:49:49.112944 kubelet[2195]: I0513 00:49:49.112868 2195 topology_manager.go:215] "Topology Admit Handler" podUID="d9d08b03-9a02-4ef4-a779-323f8aef023c" podNamespace="kube-system" podName="coredns-7db6d8ff4d-q5259" May 13 00:49:49.112944 kubelet[2195]: I0513 00:49:49.112941 2195 topology_manager.go:215] "Topology Admit Handler" podUID="45112d4a-c89d-4585-b353-ba665063d926" podNamespace="calico-apiserver" podName="calico-apiserver-5654474c45-ksfc4" May 13 00:49:49.113025 kubelet[2195]: I0513 00:49:49.113006 2195 topology_manager.go:215] "Topology Admit Handler" podUID="7a6987c0-057d-4829-baff-0ba8bb8eb7b6" podNamespace="calico-system" podName="calico-kube-controllers-66f4c646c8-pcvzj" May 13 00:49:49.142285 env[1255]: time="2025-05-13T00:49:49.142254348Z" level=info msg="shim disconnected" id=7d38f00d4f89d15164efe4c99f3f97d75f97d91fbcd021a7778b2e6ece657779 May 13 00:49:49.142455 env[1255]: time="2025-05-13T00:49:49.142441316Z" level=warning msg="cleaning up after shim disconnected" id=7d38f00d4f89d15164efe4c99f3f97d75f97d91fbcd021a7778b2e6ece657779 namespace=k8s.io May 13 00:49:49.142514 env[1255]: time="2025-05-13T00:49:49.142502054Z" level=info msg="cleaning up dead shim" May 13 00:49:49.149543 env[1255]: time="2025-05-13T00:49:49.149505206Z" level=warning msg="cleanup warnings time=\"2025-05-13T00:49:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2925 runtime=io.containerd.runc.v2\n" May 13 00:49:49.177090 systemd[1]: Created slice kubepods-burstable-podd9d08b03_9a02_4ef4_a779_323f8aef023c.slice. May 13 00:49:49.183312 systemd[1]: Created slice kubepods-besteffort-pod45112d4a_c89d_4585_b353_ba665063d926.slice. May 13 00:49:49.190509 systemd[1]: Created slice kubepods-burstable-podb32c0982_4af4_4a32_bebb_0f2cccf5d98b.slice. May 13 00:49:49.194250 kubelet[2195]: I0513 00:49:49.194052 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r5xft\" (UniqueName: \"kubernetes.io/projected/7a6987c0-057d-4829-baff-0ba8bb8eb7b6-kube-api-access-r5xft\") pod \"calico-kube-controllers-66f4c646c8-pcvzj\" (UID: \"7a6987c0-057d-4829-baff-0ba8bb8eb7b6\") " pod="calico-system/calico-kube-controllers-66f4c646c8-pcvzj" May 13 00:49:49.194250 kubelet[2195]: I0513 00:49:49.194073 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/770c6e58-a9b2-4d68-8a22-9c0e004bf992-calico-apiserver-certs\") pod \"calico-apiserver-5654474c45-m4qdr\" (UID: \"770c6e58-a9b2-4d68-8a22-9c0e004bf992\") " pod="calico-apiserver/calico-apiserver-5654474c45-m4qdr" May 13 00:49:49.194250 kubelet[2195]: I0513 00:49:49.194087 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8hbv9\" (UniqueName: \"kubernetes.io/projected/45112d4a-c89d-4585-b353-ba665063d926-kube-api-access-8hbv9\") pod \"calico-apiserver-5654474c45-ksfc4\" (UID: \"45112d4a-c89d-4585-b353-ba665063d926\") " pod="calico-apiserver/calico-apiserver-5654474c45-ksfc4" May 13 00:49:49.194250 kubelet[2195]: I0513 00:49:49.194110 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dxnqs\" (UniqueName: \"kubernetes.io/projected/b32c0982-4af4-4a32-bebb-0f2cccf5d98b-kube-api-access-dxnqs\") pod \"coredns-7db6d8ff4d-9zwh9\" (UID: \"b32c0982-4af4-4a32-bebb-0f2cccf5d98b\") " pod="kube-system/coredns-7db6d8ff4d-9zwh9" May 13 00:49:49.194134 systemd[1]: Created slice kubepods-besteffort-pod7a6987c0_057d_4829_baff_0ba8bb8eb7b6.slice. May 13 00:49:49.194496 kubelet[2195]: I0513 00:49:49.194375 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9djql\" (UniqueName: \"kubernetes.io/projected/d9d08b03-9a02-4ef4-a779-323f8aef023c-kube-api-access-9djql\") pod \"coredns-7db6d8ff4d-q5259\" (UID: \"d9d08b03-9a02-4ef4-a779-323f8aef023c\") " pod="kube-system/coredns-7db6d8ff4d-q5259" May 13 00:49:49.194496 kubelet[2195]: I0513 00:49:49.194396 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d9d08b03-9a02-4ef4-a779-323f8aef023c-config-volume\") pod \"coredns-7db6d8ff4d-q5259\" (UID: \"d9d08b03-9a02-4ef4-a779-323f8aef023c\") " pod="kube-system/coredns-7db6d8ff4d-q5259" May 13 00:49:49.194496 kubelet[2195]: I0513 00:49:49.194406 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7a6987c0-057d-4829-baff-0ba8bb8eb7b6-tigera-ca-bundle\") pod \"calico-kube-controllers-66f4c646c8-pcvzj\" (UID: \"7a6987c0-057d-4829-baff-0ba8bb8eb7b6\") " pod="calico-system/calico-kube-controllers-66f4c646c8-pcvzj" May 13 00:49:49.194496 kubelet[2195]: I0513 00:49:49.194417 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/45112d4a-c89d-4585-b353-ba665063d926-calico-apiserver-certs\") pod \"calico-apiserver-5654474c45-ksfc4\" (UID: \"45112d4a-c89d-4585-b353-ba665063d926\") " pod="calico-apiserver/calico-apiserver-5654474c45-ksfc4" May 13 00:49:49.194496 kubelet[2195]: I0513 00:49:49.194426 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b32c0982-4af4-4a32-bebb-0f2cccf5d98b-config-volume\") pod \"coredns-7db6d8ff4d-9zwh9\" (UID: \"b32c0982-4af4-4a32-bebb-0f2cccf5d98b\") " pod="kube-system/coredns-7db6d8ff4d-9zwh9" May 13 00:49:49.194600 kubelet[2195]: I0513 00:49:49.194435 2195 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgvj5\" (UniqueName: \"kubernetes.io/projected/770c6e58-a9b2-4d68-8a22-9c0e004bf992-kube-api-access-rgvj5\") pod \"calico-apiserver-5654474c45-m4qdr\" (UID: \"770c6e58-a9b2-4d68-8a22-9c0e004bf992\") " pod="calico-apiserver/calico-apiserver-5654474c45-m4qdr" May 13 00:49:49.198908 systemd[1]: Created slice kubepods-besteffort-pod770c6e58_a9b2_4d68_8a22_9c0e004bf992.slice. May 13 00:49:49.482420 env[1255]: time="2025-05-13T00:49:49.482095698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-q5259,Uid:d9d08b03-9a02-4ef4-a779-323f8aef023c,Namespace:kube-system,Attempt:0,}" May 13 00:49:49.488361 env[1255]: time="2025-05-13T00:49:49.488123049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5654474c45-ksfc4,Uid:45112d4a-c89d-4585-b353-ba665063d926,Namespace:calico-apiserver,Attempt:0,}" May 13 00:49:49.494925 env[1255]: time="2025-05-13T00:49:49.494903807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-9zwh9,Uid:b32c0982-4af4-4a32-bebb-0f2cccf5d98b,Namespace:kube-system,Attempt:0,}" May 13 00:49:49.500476 env[1255]: time="2025-05-13T00:49:49.500456151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66f4c646c8-pcvzj,Uid:7a6987c0-057d-4829-baff-0ba8bb8eb7b6,Namespace:calico-system,Attempt:0,}" May 13 00:49:49.501903 env[1255]: time="2025-05-13T00:49:49.501885251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5654474c45-m4qdr,Uid:770c6e58-a9b2-4d68-8a22-9c0e004bf992,Namespace:calico-apiserver,Attempt:0,}" May 13 00:49:49.514753 systemd[1]: Created slice kubepods-besteffort-pod43f79210_2931_4b10_89eb_d5d1daf62487.slice. May 13 00:49:49.517243 env[1255]: time="2025-05-13T00:49:49.517214718Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7pn4l,Uid:43f79210-2931-4b10-89eb-d5d1daf62487,Namespace:calico-system,Attempt:0,}" May 13 00:49:49.724254 env[1255]: time="2025-05-13T00:49:49.724217385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 00:49:49.913634 env[1255]: time="2025-05-13T00:49:49.913549238Z" level=error msg="Failed to destroy network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.916142 env[1255]: time="2025-05-13T00:49:49.915270724Z" level=error msg="encountered an error cleaning up failed sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.916142 env[1255]: time="2025-05-13T00:49:49.915311299Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-q5259,Uid:d9d08b03-9a02-4ef4-a779-323f8aef023c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.914964 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56-shm.mount: Deactivated successfully. May 13 00:49:49.920210 kubelet[2195]: E0513 00:49:49.917246 2195 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.921264 kubelet[2195]: E0513 00:49:49.921237 2195 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-q5259" May 13 00:49:49.921315 kubelet[2195]: E0513 00:49:49.921267 2195 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-q5259" May 13 00:49:49.921346 kubelet[2195]: E0513 00:49:49.921315 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-q5259_kube-system(d9d08b03-9a02-4ef4-a779-323f8aef023c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-q5259_kube-system(d9d08b03-9a02-4ef4-a779-323f8aef023c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-q5259" podUID="d9d08b03-9a02-4ef4-a779-323f8aef023c" May 13 00:49:49.941568 env[1255]: time="2025-05-13T00:49:49.941528352Z" level=error msg="Failed to destroy network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.943768 env[1255]: time="2025-05-13T00:49:49.943110297Z" level=error msg="encountered an error cleaning up failed sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.943768 env[1255]: time="2025-05-13T00:49:49.943147701Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-9zwh9,Uid:b32c0982-4af4-4a32-bebb-0f2cccf5d98b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.943820 kubelet[2195]: E0513 00:49:49.943434 2195 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.943820 kubelet[2195]: E0513 00:49:49.943467 2195 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-9zwh9" May 13 00:49:49.943820 kubelet[2195]: E0513 00:49:49.943480 2195 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-9zwh9" May 13 00:49:49.942910 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7-shm.mount: Deactivated successfully. May 13 00:49:49.943933 kubelet[2195]: E0513 00:49:49.943520 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-9zwh9_kube-system(b32c0982-4af4-4a32-bebb-0f2cccf5d98b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-9zwh9_kube-system(b32c0982-4af4-4a32-bebb-0f2cccf5d98b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-9zwh9" podUID="b32c0982-4af4-4a32-bebb-0f2cccf5d98b" May 13 00:49:49.948666 env[1255]: time="2025-05-13T00:49:49.948622064Z" level=error msg="Failed to destroy network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.950763 env[1255]: time="2025-05-13T00:49:49.950181583Z" level=error msg="encountered an error cleaning up failed sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.950763 env[1255]: time="2025-05-13T00:49:49.950216077Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66f4c646c8-pcvzj,Uid:7a6987c0-057d-4829-baff-0ba8bb8eb7b6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.958837 kubelet[2195]: E0513 00:49:49.950323 2195 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.958837 kubelet[2195]: E0513 00:49:49.950367 2195 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-66f4c646c8-pcvzj" May 13 00:49:49.958837 kubelet[2195]: E0513 00:49:49.950379 2195 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-66f4c646c8-pcvzj" May 13 00:49:49.949970 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb-shm.mount: Deactivated successfully. May 13 00:49:49.961651 env[1255]: time="2025-05-13T00:49:49.954442588Z" level=error msg="Failed to destroy network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.961651 env[1255]: time="2025-05-13T00:49:49.956457414Z" level=error msg="encountered an error cleaning up failed sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.961651 env[1255]: time="2025-05-13T00:49:49.956512788Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5654474c45-ksfc4,Uid:45112d4a-c89d-4585-b353-ba665063d926,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.961741 kubelet[2195]: E0513 00:49:49.950403 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-66f4c646c8-pcvzj_calico-system(7a6987c0-057d-4829-baff-0ba8bb8eb7b6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-66f4c646c8-pcvzj_calico-system(7a6987c0-057d-4829-baff-0ba8bb8eb7b6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-66f4c646c8-pcvzj" podUID="7a6987c0-057d-4829-baff-0ba8bb8eb7b6" May 13 00:49:49.961741 kubelet[2195]: E0513 00:49:49.956640 2195 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.961741 kubelet[2195]: E0513 00:49:49.956683 2195 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5654474c45-ksfc4" May 13 00:49:49.956197 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d-shm.mount: Deactivated successfully. May 13 00:49:49.961868 kubelet[2195]: E0513 00:49:49.956696 2195 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5654474c45-ksfc4" May 13 00:49:49.961868 kubelet[2195]: E0513 00:49:49.956725 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5654474c45-ksfc4_calico-apiserver(45112d4a-c89d-4585-b353-ba665063d926)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5654474c45-ksfc4_calico-apiserver(45112d4a-c89d-4585-b353-ba665063d926)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5654474c45-ksfc4" podUID="45112d4a-c89d-4585-b353-ba665063d926" May 13 00:49:49.963362 env[1255]: time="2025-05-13T00:49:49.963279706Z" level=error msg="Failed to destroy network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.969078 env[1255]: time="2025-05-13T00:49:49.963626762Z" level=error msg="encountered an error cleaning up failed sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.969078 env[1255]: time="2025-05-13T00:49:49.963657249Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5654474c45-m4qdr,Uid:770c6e58-a9b2-4d68-8a22-9c0e004bf992,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.969078 env[1255]: time="2025-05-13T00:49:49.963942545Z" level=error msg="Failed to destroy network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.969078 env[1255]: time="2025-05-13T00:49:49.964105086Z" level=error msg="encountered an error cleaning up failed sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.969078 env[1255]: time="2025-05-13T00:49:49.964125887Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7pn4l,Uid:43f79210-2931-4b10-89eb-d5d1daf62487,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.974632 kubelet[2195]: E0513 00:49:49.963804 2195 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.974632 kubelet[2195]: E0513 00:49:49.963845 2195 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5654474c45-m4qdr" May 13 00:49:49.974632 kubelet[2195]: E0513 00:49:49.963859 2195 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5654474c45-m4qdr" May 13 00:49:49.974716 kubelet[2195]: E0513 00:49:49.963889 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5654474c45-m4qdr_calico-apiserver(770c6e58-a9b2-4d68-8a22-9c0e004bf992)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5654474c45-m4qdr_calico-apiserver(770c6e58-a9b2-4d68-8a22-9c0e004bf992)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5654474c45-m4qdr" podUID="770c6e58-a9b2-4d68-8a22-9c0e004bf992" May 13 00:49:49.974716 kubelet[2195]: E0513 00:49:49.964211 2195 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:49.974716 kubelet[2195]: E0513 00:49:49.964230 2195 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7pn4l" May 13 00:49:49.976449 kubelet[2195]: E0513 00:49:49.964255 2195 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7pn4l" May 13 00:49:49.976449 kubelet[2195]: E0513 00:49:49.964279 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7pn4l_calico-system(43f79210-2931-4b10-89eb-d5d1daf62487)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7pn4l_calico-system(43f79210-2931-4b10-89eb-d5d1daf62487)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7pn4l" podUID="43f79210-2931-4b10-89eb-d5d1daf62487" May 13 00:49:50.716060 kubelet[2195]: I0513 00:49:50.716019 2195 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:49:50.716700 kubelet[2195]: I0513 00:49:50.716686 2195 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:49:50.752174 kubelet[2195]: I0513 00:49:50.752158 2195 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:49:50.752869 kubelet[2195]: I0513 00:49:50.752859 2195 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:49:50.753428 kubelet[2195]: I0513 00:49:50.753419 2195 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:49:50.753958 kubelet[2195]: I0513 00:49:50.753949 2195 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:49:50.769966 env[1255]: time="2025-05-13T00:49:50.769939711Z" level=info msg="StopPodSandbox for \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\"" May 13 00:49:50.770367 env[1255]: time="2025-05-13T00:49:50.770354302Z" level=info msg="StopPodSandbox for \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\"" May 13 00:49:50.780712 env[1255]: time="2025-05-13T00:49:50.780673423Z" level=info msg="StopPodSandbox for \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\"" May 13 00:49:50.780879 env[1255]: time="2025-05-13T00:49:50.780866732Z" level=info msg="StopPodSandbox for \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\"" May 13 00:49:50.781075 env[1255]: time="2025-05-13T00:49:50.780673428Z" level=info msg="StopPodSandbox for \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\"" May 13 00:49:50.781323 env[1255]: time="2025-05-13T00:49:50.780689464Z" level=info msg="StopPodSandbox for \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\"" May 13 00:49:50.820420 env[1255]: time="2025-05-13T00:49:50.820383075Z" level=error msg="StopPodSandbox for \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\" failed" error="failed to destroy network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:50.820785 kubelet[2195]: E0513 00:49:50.820650 2195 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:49:50.820785 kubelet[2195]: E0513 00:49:50.820692 2195 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56"} May 13 00:49:50.820785 kubelet[2195]: E0513 00:49:50.820739 2195 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9d08b03-9a02-4ef4-a779-323f8aef023c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:49:50.820785 kubelet[2195]: E0513 00:49:50.820755 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9d08b03-9a02-4ef4-a779-323f8aef023c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-q5259" podUID="d9d08b03-9a02-4ef4-a779-323f8aef023c" May 13 00:49:50.828169 env[1255]: time="2025-05-13T00:49:50.828126305Z" level=error msg="StopPodSandbox for \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\" failed" error="failed to destroy network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:50.828505 kubelet[2195]: E0513 00:49:50.828385 2195 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:49:50.828505 kubelet[2195]: E0513 00:49:50.828425 2195 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d"} May 13 00:49:50.828505 kubelet[2195]: E0513 00:49:50.828448 2195 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"45112d4a-c89d-4585-b353-ba665063d926\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:49:50.828505 kubelet[2195]: E0513 00:49:50.828464 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"45112d4a-c89d-4585-b353-ba665063d926\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5654474c45-ksfc4" podUID="45112d4a-c89d-4585-b353-ba665063d926" May 13 00:49:50.829878 env[1255]: time="2025-05-13T00:49:50.829846208Z" level=error msg="StopPodSandbox for \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\" failed" error="failed to destroy network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:50.830152 kubelet[2195]: E0513 00:49:50.830049 2195 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:49:50.830152 kubelet[2195]: E0513 00:49:50.830082 2195 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb"} May 13 00:49:50.830152 kubelet[2195]: E0513 00:49:50.830104 2195 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7a6987c0-057d-4829-baff-0ba8bb8eb7b6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:49:50.830152 kubelet[2195]: E0513 00:49:50.830118 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7a6987c0-057d-4829-baff-0ba8bb8eb7b6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-66f4c646c8-pcvzj" podUID="7a6987c0-057d-4829-baff-0ba8bb8eb7b6" May 13 00:49:50.839718 env[1255]: time="2025-05-13T00:49:50.839678410Z" level=error msg="StopPodSandbox for \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\" failed" error="failed to destroy network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:50.840046 kubelet[2195]: E0513 00:49:50.839933 2195 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:49:50.840046 kubelet[2195]: E0513 00:49:50.839968 2195 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1"} May 13 00:49:50.840046 kubelet[2195]: E0513 00:49:50.839991 2195 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"43f79210-2931-4b10-89eb-d5d1daf62487\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:49:50.840046 kubelet[2195]: E0513 00:49:50.840020 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"43f79210-2931-4b10-89eb-d5d1daf62487\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7pn4l" podUID="43f79210-2931-4b10-89eb-d5d1daf62487" May 13 00:49:50.840630 env[1255]: time="2025-05-13T00:49:50.840608112Z" level=error msg="StopPodSandbox for \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\" failed" error="failed to destroy network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:50.840858 kubelet[2195]: E0513 00:49:50.840771 2195 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:49:50.840858 kubelet[2195]: E0513 00:49:50.840790 2195 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4"} May 13 00:49:50.840858 kubelet[2195]: E0513 00:49:50.840815 2195 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"770c6e58-a9b2-4d68-8a22-9c0e004bf992\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:49:50.840858 kubelet[2195]: E0513 00:49:50.840827 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"770c6e58-a9b2-4d68-8a22-9c0e004bf992\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5654474c45-m4qdr" podUID="770c6e58-a9b2-4d68-8a22-9c0e004bf992" May 13 00:49:50.848197 env[1255]: time="2025-05-13T00:49:50.848161821Z" level=error msg="StopPodSandbox for \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\" failed" error="failed to destroy network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 00:49:50.848565 kubelet[2195]: E0513 00:49:50.848443 2195 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:49:50.848565 kubelet[2195]: E0513 00:49:50.848486 2195 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7"} May 13 00:49:50.848565 kubelet[2195]: E0513 00:49:50.848508 2195 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b32c0982-4af4-4a32-bebb-0f2cccf5d98b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 00:49:50.848565 kubelet[2195]: E0513 00:49:50.848539 2195 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b32c0982-4af4-4a32-bebb-0f2cccf5d98b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-9zwh9" podUID="b32c0982-4af4-4a32-bebb-0f2cccf5d98b" May 13 00:49:50.873658 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1-shm.mount: Deactivated successfully. May 13 00:49:50.873715 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4-shm.mount: Deactivated successfully. May 13 00:49:52.317210 kubelet[2195]: I0513 00:49:52.317183 2195 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:49:52.452000 audit[3272]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:52.452000 audit[3272]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdda5fb360 a2=0 a3=7ffdda5fb34c items=0 ppid=2331 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:52.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:52.456000 audit[3272]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:49:52.456000 audit[3272]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffdda5fb360 a2=0 a3=7ffdda5fb34c items=0 ppid=2331 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:52.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:49:55.342386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount910421289.mount: Deactivated successfully. May 13 00:49:55.402571 env[1255]: time="2025-05-13T00:49:55.402541144Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:55.404691 env[1255]: time="2025-05-13T00:49:55.404674448Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:55.405891 env[1255]: time="2025-05-13T00:49:55.405875858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:55.407145 env[1255]: time="2025-05-13T00:49:55.407128722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:49:55.407589 env[1255]: time="2025-05-13T00:49:55.407570137Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 00:49:55.425649 env[1255]: time="2025-05-13T00:49:55.425627790Z" level=info msg="CreateContainer within sandbox \"db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 00:49:55.435737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount615776616.mount: Deactivated successfully. May 13 00:49:55.437686 env[1255]: time="2025-05-13T00:49:55.437667024Z" level=info msg="CreateContainer within sandbox \"db760143d3431b1bac5a19eeaff8b0613ddeba9ded5db080a05aa1f3f97b19b5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"962f0327c39484bddf104a356ef101e2f3f0f0c3056be0ef038f683f2cca3cc4\"" May 13 00:49:55.439168 env[1255]: time="2025-05-13T00:49:55.439155323Z" level=info msg="StartContainer for \"962f0327c39484bddf104a356ef101e2f3f0f0c3056be0ef038f683f2cca3cc4\"" May 13 00:49:55.455624 systemd[1]: Started cri-containerd-962f0327c39484bddf104a356ef101e2f3f0f0c3056be0ef038f683f2cca3cc4.scope. May 13 00:49:55.473497 kernel: kauditd_printk_skb: 40 callbacks suppressed May 13 00:49:55.477487 kernel: audit: type=1400 audit(1747097395.466:1004): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.480962 kernel: audit: type=1300 audit(1747097395.466:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1072e38998 items=0 ppid=2671 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:55.481391 kernel: audit: type=1327 audit(1747097395.466:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936326630333237633339343834626464663130346133353665663130 May 13 00:49:55.481415 kernel: audit: type=1400 audit(1747097395.466:1005): avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.486999 kernel: audit: type=1400 audit(1747097395.466:1005): avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.487525 kernel: audit: type=1400 audit(1747097395.466:1005): avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1072e38998 items=0 ppid=2671 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:55.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936326630333237633339343834626464663130346133353665663130 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.489387 env[1255]: time="2025-05-13T00:49:55.488716897Z" level=info msg="StartContainer for \"962f0327c39484bddf104a356ef101e2f3f0f0c3056be0ef038f683f2cca3cc4\" returns successfully" May 13 00:49:55.491845 kernel: audit: type=1400 audit(1747097395.466:1005): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.491879 kernel: audit: type=1400 audit(1747097395.466:1005): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.496540 kernel: audit: type=1400 audit(1747097395.466:1005): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.499310 kernel: audit: type=1400 audit(1747097395.466:1005): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.466000 audit: BPF prog-id=133 op=LOAD May 13 00:49:55.466000 audit[3282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a9448 items=0 ppid=2671 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:55.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936326630333237633339343834626464663130346133353665663130 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit: BPF prog-id=134 op=LOAD May 13 00:49:55.473000 audit[3282]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a9498 items=0 ppid=2671 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:55.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936326630333237633339343834626464663130346133353665663130 May 13 00:49:55.473000 audit: BPF prog-id=134 op=UNLOAD May 13 00:49:55.473000 audit: BPF prog-id=133 op=UNLOAD May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:55.473000 audit: BPF prog-id=135 op=LOAD May 13 00:49:55.473000 audit[3282]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a9528 items=0 ppid=2671 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:55.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936326630333237633339343834626464663130346133353665663130 May 13 00:49:55.882991 kubelet[2195]: I0513 00:49:55.880675 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-r82xd" podStartSLOduration=1.1225093369999999 podStartE2EDuration="16.879313518s" podCreationTimestamp="2025-05-13 00:49:39 +0000 UTC" firstStartedPulling="2025-05-13 00:49:39.651717686 +0000 UTC m=+17.416772115" lastFinishedPulling="2025-05-13 00:49:55.408521868 +0000 UTC m=+33.173576296" observedRunningTime="2025-05-13 00:49:55.87600221 +0000 UTC m=+33.641056638" watchObservedRunningTime="2025-05-13 00:49:55.879313518 +0000 UTC m=+33.644367945" May 13 00:49:56.069036 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 00:49:56.069123 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 00:49:57.796000 audit[3406]: AVC avc: denied { write } for pid=3406 comm="tee" name="fd" dev="proc" ino=36401 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:49:57.796000 audit[3406]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc91f76a2e a2=241 a3=1b6 items=1 ppid=3353 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:57.796000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 00:49:57.796000 audit: PATH item=0 name="/dev/fd/63" inode=36390 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:49:57.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:49:57.800000 audit[3410]: AVC avc: denied { write } for pid=3410 comm="tee" name="fd" dev="proc" ino=36405 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:49:57.800000 audit[3410]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd58cd1a30 a2=241 a3=1b6 items=1 ppid=3350 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:57.801000 audit[3408]: AVC avc: denied { write } for pid=3408 comm="tee" name="fd" dev="proc" ino=36409 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:49:57.801000 audit[3408]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc63361a2f a2=241 a3=1b6 items=1 ppid=3349 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:57.801000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 00:49:57.801000 audit: PATH item=0 name="/dev/fd/63" inode=35274 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:49:57.801000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:49:57.803000 audit[3398]: AVC avc: denied { write } for pid=3398 comm="tee" name="fd" dev="proc" ino=36413 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:49:57.803000 audit[3398]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee94daa1e a2=241 a3=1b6 items=1 ppid=3366 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:57.800000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 00:49:57.800000 audit: PATH item=0 name="/dev/fd/63" inode=35275 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:49:57.800000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:49:57.803000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 00:49:57.803000 audit: PATH item=0 name="/dev/fd/63" inode=35268 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:49:57.803000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:49:57.813000 audit[3415]: AVC avc: denied { write } for pid=3415 comm="tee" name="fd" dev="proc" ino=36417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:49:57.813000 audit[3415]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea2f81a1f a2=241 a3=1b6 items=1 ppid=3348 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:57.813000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 00:49:57.813000 audit: PATH item=0 name="/dev/fd/63" inode=36398 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:49:57.813000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:49:57.815000 audit[3413]: AVC avc: denied { write } for pid=3413 comm="tee" name="fd" dev="proc" ino=36421 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:49:57.815000 audit[3413]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5ceaea2e a2=241 a3=1b6 items=1 ppid=3352 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:57.815000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 00:49:57.815000 audit: PATH item=0 name="/dev/fd/63" inode=35276 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:49:57.815000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:49:57.824000 audit[3423]: AVC avc: denied { write } for pid=3423 comm="tee" name="fd" dev="proc" ino=36425 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 00:49:57.824000 audit[3423]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3f3d5a2e a2=241 a3=1b6 items=1 ppid=3361 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:57.824000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 00:49:57.824000 audit: PATH item=0 name="/dev/fd/63" inode=35279 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 00:49:57.824000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.001000 audit: BPF prog-id=136 op=LOAD May 13 00:49:58.001000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd5fb7a00 a2=98 a3=3 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.001000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.001000 audit: BPF prog-id=136 op=UNLOAD May 13 00:49:58.003000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit: BPF prog-id=137 op=LOAD May 13 00:49:58.003000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd5fb77e0 a2=74 a3=540051 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.003000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.003000 audit: BPF prog-id=137 op=UNLOAD May 13 00:49:58.003000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.003000 audit: BPF prog-id=138 op=LOAD May 13 00:49:58.003000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd5fb7810 a2=94 a3=2 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.003000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.003000 audit: BPF prog-id=138 op=UNLOAD May 13 00:49:58.068000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit: BPF prog-id=139 op=LOAD May 13 00:49:58.068000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdd5fb76d0 a2=40 a3=1 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.068000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.068000 audit: BPF prog-id=139 op=UNLOAD May 13 00:49:58.068000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.068000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdd5fb77a0 a2=50 a3=7ffdd5fb7880 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.068000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd5fb76e0 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.075000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd5fb7710 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.075000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd5fb7620 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.075000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd5fb7730 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.075000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd5fb7710 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.075000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd5fb7700 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.075000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.075000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.075000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd5fb7730 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.075000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd5fb7710 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd5fb7730 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdd5fb7700 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdd5fb7770 a2=28 a3=0 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd5fb7520 a2=50 a3=1 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit: BPF prog-id=140 op=LOAD May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdd5fb7520 a2=94 a3=5 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit: BPF prog-id=140 op=UNLOAD May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdd5fb75d0 a2=50 a3=1 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdd5fb76f0 a2=4 a3=38 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd5fb7740 a2=94 a3=6 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd5fb6ef0 a2=94 a3=83 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.076000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:49:58.076000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdd5fb6ef0 a2=94 a3=83 items=0 ppid=3370 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.076000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit: BPF prog-id=141 op=LOAD May 13 00:49:58.083000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc63149940 a2=98 a3=1999999999999999 items=0 ppid=3370 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.083000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:49:58.083000 audit: BPF prog-id=141 op=UNLOAD May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit: BPF prog-id=142 op=LOAD May 13 00:49:58.083000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc63149820 a2=74 a3=ffff items=0 ppid=3370 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.083000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:49:58.083000 audit: BPF prog-id=142 op=UNLOAD May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.083000 audit: BPF prog-id=143 op=LOAD May 13 00:49:58.083000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc63149860 a2=40 a3=7ffc63149a40 items=0 ppid=3370 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.083000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 00:49:58.083000 audit: BPF prog-id=143 op=UNLOAD May 13 00:49:58.138353 systemd-networkd[1059]: vxlan.calico: Link UP May 13 00:49:58.138358 systemd-networkd[1059]: vxlan.calico: Gained carrier May 13 00:49:58.159000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.159000 audit: BPF prog-id=144 op=LOAD May 13 00:49:58.159000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff04d82ab0 a2=98 a3=ffffffff items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.159000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.159000 audit: BPF prog-id=144 op=UNLOAD May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit: BPF prog-id=145 op=LOAD May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff04d828c0 a2=74 a3=540051 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit: BPF prog-id=145 op=UNLOAD May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit: BPF prog-id=146 op=LOAD May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff04d828f0 a2=94 a3=2 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit: BPF prog-id=146 op=UNLOAD May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff04d827c0 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff04d827f0 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff04d82700 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff04d82810 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff04d827f0 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff04d827e0 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff04d82810 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff04d827f0 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff04d82810 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff04d827e0 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff04d82850 a2=28 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.160000 audit: BPF prog-id=147 op=LOAD May 13 00:49:58.160000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff04d826c0 a2=40 a3=0 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.160000 audit: BPF prog-id=147 op=UNLOAD May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff04d826b0 a2=50 a3=2800 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff04d826b0 a2=50 a3=2800 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit: BPF prog-id=148 op=LOAD May 13 00:49:58.161000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff04d81ed0 a2=94 a3=2 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.161000 audit: BPF prog-id=148 op=UNLOAD May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { perfmon } for pid=3491 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit[3491]: AVC avc: denied { bpf } for pid=3491 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.161000 audit: BPF prog-id=149 op=LOAD May 13 00:49:58.161000 audit[3491]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff04d81fd0 a2=94 a3=30 items=0 ppid=3370 pid=3491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit: BPF prog-id=150 op=LOAD May 13 00:49:58.188000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff84735380 a2=98 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.188000 audit: BPF prog-id=150 op=UNLOAD May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit: BPF prog-id=151 op=LOAD May 13 00:49:58.188000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff84735160 a2=74 a3=540051 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.188000 audit: BPF prog-id=151 op=UNLOAD May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.188000 audit: BPF prog-id=152 op=LOAD May 13 00:49:58.188000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff84735190 a2=94 a3=2 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.188000 audit: BPF prog-id=152 op=UNLOAD May 13 00:49:58.284000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit: BPF prog-id=153 op=LOAD May 13 00:49:58.284000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff84735050 a2=40 a3=1 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.284000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.284000 audit: BPF prog-id=153 op=UNLOAD May 13 00:49:58.284000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.284000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff84735120 a2=50 a3=7fff84735200 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.284000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84735060 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84735090 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84734fa0 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff847350b0 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84735090 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff84735080 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff847350b0 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84735090 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff847350b0 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff84735080 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff847350f0 a2=28 a3=0 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff84734ea0 a2=50 a3=1 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit: BPF prog-id=154 op=LOAD May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff84734ea0 a2=94 a3=5 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit: BPF prog-id=154 op=UNLOAD May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff84734f50 a2=50 a3=1 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff84735070 a2=4 a3=38 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.291000 audit[3506]: AVC avc: denied { confidentiality } for pid=3506 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:49:58.291000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff847350c0 a2=94 a3=6 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.291000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { confidentiality } for pid=3506 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:49:58.293000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff84734870 a2=94 a3=83 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.293000 audit[3506]: AVC avc: denied { confidentiality } for pid=3506 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 00:49:58.293000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff84734870 a2=94 a3=83 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.293000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.294000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.294000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff847362b0 a2=10 a3=f1f00800 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.294000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.294000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff84736150 a2=10 a3=3 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.294000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.294000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff847360f0 a2=10 a3=3 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.294000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:49:58.294000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff847360f0 a2=10 a3=7 items=0 ppid=3370 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.294000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 00:49:58.301000 audit: BPF prog-id=149 op=UNLOAD May 13 00:49:58.337000 audit[3529]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3529 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:49:58.337000 audit[3529]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd145a0900 a2=0 a3=7ffd145a08ec items=0 ppid=3370 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.337000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:49:58.346000 audit[3528]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:49:58.346000 audit[3528]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff5338ce60 a2=0 a3=7fff5338ce4c items=0 ppid=3370 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.346000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:49:58.349000 audit[3531]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3531 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:49:58.349000 audit[3531]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe9ffa7070 a2=0 a3=7ffe9ffa705c items=0 ppid=3370 pid=3531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.349000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:49:58.352000 audit[3527]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3527 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:49:58.352000 audit[3527]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe1bd40b50 a2=0 a3=7ffe1bd40b3c items=0 ppid=3370 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:49:58.352000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:49:58.918120 kubelet[2195]: I0513 00:49:58.918000 2195 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:49:58.939166 systemd[1]: run-containerd-runc-k8s.io-962f0327c39484bddf104a356ef101e2f3f0f0c3056be0ef038f683f2cca3cc4-runc.1uT3VE.mount: Deactivated successfully. May 13 00:49:59.627473 systemd-networkd[1059]: vxlan.calico: Gained IPv6LL May 13 00:49:59.935647 systemd[1]: run-containerd-runc-k8s.io-962f0327c39484bddf104a356ef101e2f3f0f0c3056be0ef038f683f2cca3cc4-runc.GXRe15.mount: Deactivated successfully. May 13 00:50:02.512550 env[1255]: time="2025-05-13T00:50:02.512507750Z" level=info msg="StopPodSandbox for \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\"" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.563 [INFO][3600] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.563 [INFO][3600] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" iface="eth0" netns="/var/run/netns/cni-c0828159-73ce-52ea-4fa2-8d0b59b7909b" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.564 [INFO][3600] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" iface="eth0" netns="/var/run/netns/cni-c0828159-73ce-52ea-4fa2-8d0b59b7909b" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.565 [INFO][3600] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" iface="eth0" netns="/var/run/netns/cni-c0828159-73ce-52ea-4fa2-8d0b59b7909b" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.565 [INFO][3600] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.565 [INFO][3600] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.798 [INFO][3607] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.802 [INFO][3607] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.803 [INFO][3607] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.815 [WARNING][3607] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.815 [INFO][3607] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.816 [INFO][3607] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:02.820312 env[1255]: 2025-05-13 00:50:02.817 [INFO][3600] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:02.820295 systemd[1]: run-netns-cni\x2dc0828159\x2d73ce\x2d52ea\x2d4fa2\x2d8d0b59b7909b.mount: Deactivated successfully. May 13 00:50:02.822063 env[1255]: time="2025-05-13T00:50:02.820859688Z" level=info msg="TearDown network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\" successfully" May 13 00:50:02.822063 env[1255]: time="2025-05-13T00:50:02.820882907Z" level=info msg="StopPodSandbox for \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\" returns successfully" May 13 00:50:02.822285 env[1255]: time="2025-05-13T00:50:02.822266749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5654474c45-ksfc4,Uid:45112d4a-c89d-4585-b353-ba665063d926,Namespace:calico-apiserver,Attempt:1,}" May 13 00:50:02.920068 systemd-networkd[1059]: cali0aef133dc14: Link UP May 13 00:50:02.922913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:50:02.922963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0aef133dc14: link becomes ready May 13 00:50:02.922627 systemd-networkd[1059]: cali0aef133dc14: Gained carrier May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.864 [INFO][3613] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0 calico-apiserver-5654474c45- calico-apiserver 45112d4a-c89d-4585-b353-ba665063d926 777 0 2025-05-13 00:49:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5654474c45 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5654474c45-ksfc4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0aef133dc14 [] []}} ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-ksfc4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--ksfc4-" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.864 [INFO][3613] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-ksfc4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.889 [INFO][3627] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" HandleID="k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.895 [INFO][3627] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" HandleID="k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051310), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5654474c45-ksfc4", "timestamp":"2025-05-13 00:50:02.889080004 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.895 [INFO][3627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.895 [INFO][3627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.895 [INFO][3627] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.896 [INFO][3627] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.906 [INFO][3627] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.908 [INFO][3627] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.909 [INFO][3627] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.910 [INFO][3627] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.910 [INFO][3627] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.911 [INFO][3627] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96 May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.913 [INFO][3627] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.915 [INFO][3627] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.915 [INFO][3627] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" host="localhost" May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.915 [INFO][3627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:02.936148 env[1255]: 2025-05-13 00:50:02.915 [INFO][3627] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" HandleID="k8s-pod-network.1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.936821 env[1255]: 2025-05-13 00:50:02.918 [INFO][3613] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-ksfc4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0", GenerateName:"calico-apiserver-5654474c45-", Namespace:"calico-apiserver", SelfLink:"", UID:"45112d4a-c89d-4585-b353-ba665063d926", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5654474c45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5654474c45-ksfc4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0aef133dc14", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:02.936821 env[1255]: 2025-05-13 00:50:02.918 [INFO][3613] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-ksfc4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.936821 env[1255]: 2025-05-13 00:50:02.918 [INFO][3613] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0aef133dc14 ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-ksfc4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.936821 env[1255]: 2025-05-13 00:50:02.923 [INFO][3613] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-ksfc4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.936821 env[1255]: 2025-05-13 00:50:02.923 [INFO][3613] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-ksfc4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0", GenerateName:"calico-apiserver-5654474c45-", Namespace:"calico-apiserver", SelfLink:"", UID:"45112d4a-c89d-4585-b353-ba665063d926", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5654474c45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96", Pod:"calico-apiserver-5654474c45-ksfc4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0aef133dc14", MAC:"1e:8c:87:32:cd:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:02.936821 env[1255]: 2025-05-13 00:50:02.933 [INFO][3613] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-ksfc4" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:02.947084 env[1255]: time="2025-05-13T00:50:02.946975652Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:50:02.947084 env[1255]: time="2025-05-13T00:50:02.947003649Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:50:02.947084 env[1255]: time="2025-05-13T00:50:02.947010983Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:50:02.947368 env[1255]: time="2025-05-13T00:50:02.947320841Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96 pid=3657 runtime=io.containerd.runc.v2 May 13 00:50:02.951000 audit[3666]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3666 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:02.955165 kernel: kauditd_printk_skb: 548 callbacks suppressed May 13 00:50:02.955216 kernel: audit: type=1325 audit(1747097402.951:1112): table=filter:101 family=2 entries=40 op=nft_register_chain pid=3666 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:02.955236 kernel: audit: type=1300 audit(1747097402.951:1112): arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffc7ae10a70 a2=0 a3=7ffc7ae10a5c items=0 ppid=3370 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:02.951000 audit[3666]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffc7ae10a70 a2=0 a3=7ffc7ae10a5c items=0 ppid=3370 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:02.951000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:02.961262 kernel: audit: type=1327 audit(1747097402.951:1112): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:02.968850 systemd[1]: Started cri-containerd-1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96.scope. May 13 00:50:02.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.981041 kernel: audit: type=1400 audit(1747097402.974:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.981076 kernel: audit: type=1400 audit(1747097402.974:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.984194 systemd-resolved[1197]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:50:02.986497 kernel: audit: type=1400 audit(1747097402.974:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.986530 kernel: audit: type=1400 audit(1747097402.974:1116): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.986548 kernel: audit: type=1400 audit(1747097402.974:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.991399 kernel: audit: type=1400 audit(1747097402.974:1118): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.991433 kernel: audit: type=1400 audit(1747097402.974:1119): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.974000 audit: BPF prog-id=155 op=LOAD May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3657 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:02.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343464616430356261333830396365323333333930336130333064 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3657 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:02.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343464616430356261333830396365323333333930336130333064 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit: BPF prog-id=156 op=LOAD May 13 00:50:02.979000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00035cc40 items=0 ppid=3657 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:02.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343464616430356261333830396365323333333930336130333064 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.979000 audit: BPF prog-id=157 op=LOAD May 13 00:50:02.979000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00035cc88 items=0 ppid=3657 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:02.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343464616430356261333830396365323333333930336130333064 May 13 00:50:02.980000 audit: BPF prog-id=157 op=UNLOAD May 13 00:50:02.980000 audit: BPF prog-id=156 op=UNLOAD May 13 00:50:02.980000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { perfmon } for pid=3668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit[3668]: AVC avc: denied { bpf } for pid=3668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:02.980000 audit: BPF prog-id=158 op=LOAD May 13 00:50:02.980000 audit[3668]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00035d098 items=0 ppid=3657 pid=3668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:02.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343464616430356261333830396365323333333930336130333064 May 13 00:50:03.012405 env[1255]: time="2025-05-13T00:50:03.012374406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5654474c45-ksfc4,Uid:45112d4a-c89d-4585-b353-ba665063d926,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96\"" May 13 00:50:03.021147 env[1255]: time="2025-05-13T00:50:03.021133211Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:50:03.512409 env[1255]: time="2025-05-13T00:50:03.512310791Z" level=info msg="StopPodSandbox for \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\"" May 13 00:50:03.512705 env[1255]: time="2025-05-13T00:50:03.512687805Z" level=info msg="StopPodSandbox for \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\"" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.544 [INFO][3723] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.544 [INFO][3723] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" iface="eth0" netns="/var/run/netns/cni-1520add2-ad39-3c4d-10c0-f8ca6ad7c103" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.544 [INFO][3723] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" iface="eth0" netns="/var/run/netns/cni-1520add2-ad39-3c4d-10c0-f8ca6ad7c103" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.545 [INFO][3723] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" iface="eth0" netns="/var/run/netns/cni-1520add2-ad39-3c4d-10c0-f8ca6ad7c103" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.545 [INFO][3723] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.545 [INFO][3723] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.570 [INFO][3740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.570 [INFO][3740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.570 [INFO][3740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.578 [WARNING][3740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.578 [INFO][3740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.579 [INFO][3740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:03.581986 env[1255]: 2025-05-13 00:50:03.580 [INFO][3723] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:03.582469 env[1255]: time="2025-05-13T00:50:03.582447317Z" level=info msg="TearDown network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\" successfully" May 13 00:50:03.582527 env[1255]: time="2025-05-13T00:50:03.582513044Z" level=info msg="StopPodSandbox for \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\" returns successfully" May 13 00:50:03.583012 env[1255]: time="2025-05-13T00:50:03.582982573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-q5259,Uid:d9d08b03-9a02-4ef4-a779-323f8aef023c,Namespace:kube-system,Attempt:1,}" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.560 [INFO][3731] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.560 [INFO][3731] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" iface="eth0" netns="/var/run/netns/cni-8f2406de-4d21-a204-1d1f-7290b4c874de" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.560 [INFO][3731] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" iface="eth0" netns="/var/run/netns/cni-8f2406de-4d21-a204-1d1f-7290b4c874de" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.560 [INFO][3731] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" iface="eth0" netns="/var/run/netns/cni-8f2406de-4d21-a204-1d1f-7290b4c874de" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.560 [INFO][3731] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.560 [INFO][3731] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.587 [INFO][3747] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.588 [INFO][3747] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.588 [INFO][3747] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.591 [WARNING][3747] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.591 [INFO][3747] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.592 [INFO][3747] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:03.594359 env[1255]: 2025-05-13 00:50:03.593 [INFO][3731] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:03.594762 env[1255]: time="2025-05-13T00:50:03.594744245Z" level=info msg="TearDown network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\" successfully" May 13 00:50:03.594814 env[1255]: time="2025-05-13T00:50:03.594801175Z" level=info msg="StopPodSandbox for \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\" returns successfully" May 13 00:50:03.595232 env[1255]: time="2025-05-13T00:50:03.595209524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-9zwh9,Uid:b32c0982-4af4-4a32-bebb-0f2cccf5d98b,Namespace:kube-system,Attempt:1,}" May 13 00:50:03.661025 systemd-networkd[1059]: cali81094547881: Link UP May 13 00:50:03.663709 systemd-networkd[1059]: cali81094547881: Gained carrier May 13 00:50:03.664375 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali81094547881: link becomes ready May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.614 [INFO][3755] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--q5259-eth0 coredns-7db6d8ff4d- kube-system d9d08b03-9a02-4ef4-a779-323f8aef023c 787 0 2025-05-13 00:49:33 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-q5259 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali81094547881 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Namespace="kube-system" Pod="coredns-7db6d8ff4d-q5259" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--q5259-" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.614 [INFO][3755] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Namespace="kube-system" Pod="coredns-7db6d8ff4d-q5259" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.635 [INFO][3777] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" HandleID="k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.643 [INFO][3777] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" HandleID="k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051bf0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-q5259", "timestamp":"2025-05-13 00:50:03.635718484 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.643 [INFO][3777] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.643 [INFO][3777] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.643 [INFO][3777] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.644 [INFO][3777] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.646 [INFO][3777] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.648 [INFO][3777] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.648 [INFO][3777] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.650 [INFO][3777] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.650 [INFO][3777] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.650 [INFO][3777] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46 May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.653 [INFO][3777] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.657 [INFO][3777] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.657 [INFO][3777] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" host="localhost" May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.657 [INFO][3777] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:03.684089 env[1255]: 2025-05-13 00:50:03.657 [INFO][3777] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" HandleID="k8s-pod-network.c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.685176 env[1255]: 2025-05-13 00:50:03.659 [INFO][3755] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Namespace="kube-system" Pod="coredns-7db6d8ff4d-q5259" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--q5259-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d9d08b03-9a02-4ef4-a779-323f8aef023c", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-q5259", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali81094547881", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:03.685176 env[1255]: 2025-05-13 00:50:03.659 [INFO][3755] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Namespace="kube-system" Pod="coredns-7db6d8ff4d-q5259" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.685176 env[1255]: 2025-05-13 00:50:03.659 [INFO][3755] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali81094547881 ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Namespace="kube-system" Pod="coredns-7db6d8ff4d-q5259" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.685176 env[1255]: 2025-05-13 00:50:03.664 [INFO][3755] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Namespace="kube-system" Pod="coredns-7db6d8ff4d-q5259" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.685176 env[1255]: 2025-05-13 00:50:03.664 [INFO][3755] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Namespace="kube-system" Pod="coredns-7db6d8ff4d-q5259" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--q5259-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d9d08b03-9a02-4ef4-a779-323f8aef023c", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46", Pod:"coredns-7db6d8ff4d-q5259", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali81094547881", MAC:"5a:64:ae:22:6a:e8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:03.685176 env[1255]: 2025-05-13 00:50:03.680 [INFO][3755] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46" Namespace="kube-system" Pod="coredns-7db6d8ff4d-q5259" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:03.693000 audit[3804]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3804 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:03.697364 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8a59321c430: link becomes ready May 13 00:50:03.693000 audit[3804]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd1dc53b20 a2=0 a3=7ffd1dc53b0c items=0 ppid=3370 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.693000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:03.697068 systemd-networkd[1059]: cali8a59321c430: Link UP May 13 00:50:03.697159 systemd-networkd[1059]: cali8a59321c430: Gained carrier May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.627 [INFO][3764] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0 coredns-7db6d8ff4d- kube-system b32c0982-4af4-4a32-bebb-0f2cccf5d98b 788 0 2025-05-13 00:49:33 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-9zwh9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8a59321c430 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9zwh9" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--9zwh9-" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.627 [INFO][3764] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9zwh9" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.653 [INFO][3784] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" HandleID="k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.658 [INFO][3784] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" HandleID="k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029e7a0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-9zwh9", "timestamp":"2025-05-13 00:50:03.652994466 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.658 [INFO][3784] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.658 [INFO][3784] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.658 [INFO][3784] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.659 [INFO][3784] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.668 [INFO][3784] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.679 [INFO][3784] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.681 [INFO][3784] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.682 [INFO][3784] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.683 [INFO][3784] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.684 [INFO][3784] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4 May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.689 [INFO][3784] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.692 [INFO][3784] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.692 [INFO][3784] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" host="localhost" May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.692 [INFO][3784] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:03.711167 env[1255]: 2025-05-13 00:50:03.692 [INFO][3784] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" HandleID="k8s-pod-network.3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.711658 env[1255]: 2025-05-13 00:50:03.694 [INFO][3764] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9zwh9" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b32c0982-4af4-4a32-bebb-0f2cccf5d98b", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-9zwh9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8a59321c430", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:03.711658 env[1255]: 2025-05-13 00:50:03.694 [INFO][3764] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9zwh9" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.711658 env[1255]: 2025-05-13 00:50:03.694 [INFO][3764] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8a59321c430 ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9zwh9" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.711658 env[1255]: 2025-05-13 00:50:03.696 [INFO][3764] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9zwh9" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.711658 env[1255]: 2025-05-13 00:50:03.696 [INFO][3764] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9zwh9" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b32c0982-4af4-4a32-bebb-0f2cccf5d98b", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4", Pod:"coredns-7db6d8ff4d-9zwh9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8a59321c430", MAC:"5a:0e:87:60:3b:2b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:03.711658 env[1255]: 2025-05-13 00:50:03.708 [INFO][3764] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9zwh9" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:03.711658 env[1255]: time="2025-05-13T00:50:03.710028666Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:50:03.711658 env[1255]: time="2025-05-13T00:50:03.710245549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:50:03.711658 env[1255]: time="2025-05-13T00:50:03.710252910Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:50:03.711658 env[1255]: time="2025-05-13T00:50:03.710349127Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46 pid=3813 runtime=io.containerd.runc.v2 May 13 00:50:03.717000 audit[3845]: NETFILTER_CFG table=filter:103 family=2 entries=40 op=nft_register_chain pid=3845 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:03.717000 audit[3845]: SYSCALL arch=c000003e syscall=46 success=yes exit=21072 a0=3 a1=7fff94b51ff0 a2=0 a3=7fff94b51fdc items=0 ppid=3370 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.717000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:03.721059 systemd[1]: Started cri-containerd-c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46.scope. May 13 00:50:03.723389 env[1255]: time="2025-05-13T00:50:03.723201082Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:50:03.723389 env[1255]: time="2025-05-13T00:50:03.723313684Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:50:03.725494 env[1255]: time="2025-05-13T00:50:03.725460413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:50:03.725654 env[1255]: time="2025-05-13T00:50:03.725623091Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4 pid=3852 runtime=io.containerd.runc.v2 May 13 00:50:03.734116 systemd[1]: Started cri-containerd-3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4.scope. May 13 00:50:03.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.736000 audit: BPF prog-id=159 op=LOAD May 13 00:50:03.739000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3813 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166656235633861623866626133353763616262383436343931 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3813 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166656235633861623866626133353763616262383436343931 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.739000 audit: BPF prog-id=160 op=LOAD May 13 00:50:03.739000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003008a0 items=0 ppid=3813 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166656235633861623866626133353763616262383436343931 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit: BPF prog-id=161 op=LOAD May 13 00:50:03.740000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003008e8 items=0 ppid=3813 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166656235633861623866626133353763616262383436343931 May 13 00:50:03.740000 audit: BPF prog-id=161 op=UNLOAD May 13 00:50:03.740000 audit: BPF prog-id=160 op=UNLOAD May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.740000 audit: BPF prog-id=162 op=LOAD May 13 00:50:03.740000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000300cf8 items=0 ppid=3813 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332333166656235633861623866626133353763616262383436343931 May 13 00:50:03.742931 systemd-resolved[1197]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:50:03.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.759000 audit: BPF prog-id=163 op=LOAD May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3852 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383435383464316237393563336635326136383463326666386636 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3852 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383435383464316237393563336635326136383463326666386636 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit: BPF prog-id=164 op=LOAD May 13 00:50:03.760000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000308350 items=0 ppid=3852 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383435383464316237393563336635326136383463326666386636 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit: BPF prog-id=165 op=LOAD May 13 00:50:03.760000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000308398 items=0 ppid=3852 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383435383464316237393563336635326136383463326666386636 May 13 00:50:03.760000 audit: BPF prog-id=165 op=UNLOAD May 13 00:50:03.760000 audit: BPF prog-id=164 op=UNLOAD May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:03.760000 audit: BPF prog-id=166 op=LOAD May 13 00:50:03.760000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003087a8 items=0 ppid=3852 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:03.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383435383464316237393563336635326136383463326666386636 May 13 00:50:03.763026 systemd-resolved[1197]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:50:03.778697 env[1255]: time="2025-05-13T00:50:03.776701542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-q5259,Uid:d9d08b03-9a02-4ef4-a779-323f8aef023c,Namespace:kube-system,Attempt:1,} returns sandbox id \"c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46\"" May 13 00:50:03.784273 env[1255]: time="2025-05-13T00:50:03.784248442Z" level=info msg="CreateContainer within sandbox \"c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:50:03.792618 env[1255]: time="2025-05-13T00:50:03.792586647Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-9zwh9,Uid:b32c0982-4af4-4a32-bebb-0f2cccf5d98b,Namespace:kube-system,Attempt:1,} returns sandbox id \"3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4\"" May 13 00:50:03.795088 env[1255]: time="2025-05-13T00:50:03.795073117Z" level=info msg="CreateContainer within sandbox \"3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 13 00:50:03.822295 systemd[1]: run-netns-cni\x2d8f2406de\x2d4d21\x2da204\x2d1d1f\x2d7290b4c874de.mount: Deactivated successfully. May 13 00:50:03.822356 systemd[1]: run-netns-cni\x2d1520add2\x2dad39\x2d3c4d\x2d10c0\x2df8ca6ad7c103.mount: Deactivated successfully. May 13 00:50:04.026837 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3804277285.mount: Deactivated successfully. May 13 00:50:04.030135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1707709549.mount: Deactivated successfully. May 13 00:50:04.035186 env[1255]: time="2025-05-13T00:50:04.035157416Z" level=info msg="CreateContainer within sandbox \"3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"eacd86a945f91e8379e3a1a9d5154015298ab35c1fa53a9c1bed34729b9a32ac\"" May 13 00:50:04.035967 env[1255]: time="2025-05-13T00:50:04.035950024Z" level=info msg="StartContainer for \"eacd86a945f91e8379e3a1a9d5154015298ab35c1fa53a9c1bed34729b9a32ac\"" May 13 00:50:04.037517 env[1255]: time="2025-05-13T00:50:04.037488905Z" level=info msg="CreateContainer within sandbox \"c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"dba782f9b881a88ed555f106a905ee8d56aa39171793bd21a2dbae62b8fc19c1\"" May 13 00:50:04.038143 env[1255]: time="2025-05-13T00:50:04.038030977Z" level=info msg="StartContainer for \"dba782f9b881a88ed555f106a905ee8d56aa39171793bd21a2dbae62b8fc19c1\"" May 13 00:50:04.049680 systemd[1]: Started cri-containerd-eacd86a945f91e8379e3a1a9d5154015298ab35c1fa53a9c1bed34729b9a32ac.scope. May 13 00:50:04.061310 systemd[1]: Started cri-containerd-dba782f9b881a88ed555f106a905ee8d56aa39171793bd21a2dbae62b8fc19c1.scope. May 13 00:50:04.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.073000 audit: BPF prog-id=167 op=LOAD May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3852 pid=3911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636438366139343566393165383337396533613161396435313534 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3852 pid=3911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636438366139343566393165383337396533613161396435313534 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit: BPF prog-id=168 op=LOAD May 13 00:50:04.074000 audit[3911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024730 items=0 ppid=3852 pid=3911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636438366139343566393165383337396533613161396435313534 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit: BPF prog-id=169 op=LOAD May 13 00:50:04.074000 audit[3911]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024778 items=0 ppid=3852 pid=3911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636438366139343566393165383337396533613161396435313534 May 13 00:50:04.074000 audit: BPF prog-id=169 op=UNLOAD May 13 00:50:04.074000 audit: BPF prog-id=168 op=UNLOAD May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { perfmon } for pid=3911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit[3911]: AVC avc: denied { bpf } for pid=3911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.074000 audit: BPF prog-id=170 op=LOAD May 13 00:50:04.074000 audit[3911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024b88 items=0 ppid=3852 pid=3911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561636438366139343566393165383337396533613161396435313534 May 13 00:50:04.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.075000 audit: BPF prog-id=171 op=LOAD May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3813 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613738326639623838316138386564353535663130366139303565 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3813 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613738326639623838316138386564353535663130366139303565 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit: BPF prog-id=172 op=LOAD May 13 00:50:04.076000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000330c10 items=0 ppid=3813 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613738326639623838316138386564353535663130366139303565 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit: BPF prog-id=173 op=LOAD May 13 00:50:04.076000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000330c58 items=0 ppid=3813 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613738326639623838316138386564353535663130366139303565 May 13 00:50:04.076000 audit: BPF prog-id=173 op=UNLOAD May 13 00:50:04.076000 audit: BPF prog-id=172 op=UNLOAD May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.076000 audit: BPF prog-id=174 op=LOAD May 13 00:50:04.076000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000331068 items=0 ppid=3813 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462613738326639623838316138386564353535663130366139303565 May 13 00:50:04.092801 env[1255]: time="2025-05-13T00:50:04.092772469Z" level=info msg="StartContainer for \"eacd86a945f91e8379e3a1a9d5154015298ab35c1fa53a9c1bed34729b9a32ac\" returns successfully" May 13 00:50:04.096439 env[1255]: time="2025-05-13T00:50:04.096410521Z" level=info msg="StartContainer for \"dba782f9b881a88ed555f106a905ee8d56aa39171793bd21a2dbae62b8fc19c1\" returns successfully" May 13 00:50:04.172425 systemd-networkd[1059]: cali0aef133dc14: Gained IPv6LL May 13 00:50:04.513806 env[1255]: time="2025-05-13T00:50:04.512434893Z" level=info msg="StopPodSandbox for \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\"" May 13 00:50:04.515271 env[1255]: time="2025-05-13T00:50:04.515246779Z" level=info msg="StopPodSandbox for \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\"" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.551 [INFO][4001] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.551 [INFO][4001] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" iface="eth0" netns="/var/run/netns/cni-b418f235-459c-fe75-f38c-f91c4a87861d" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.551 [INFO][4001] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" iface="eth0" netns="/var/run/netns/cni-b418f235-459c-fe75-f38c-f91c4a87861d" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.551 [INFO][4001] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" iface="eth0" netns="/var/run/netns/cni-b418f235-459c-fe75-f38c-f91c4a87861d" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.551 [INFO][4001] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.551 [INFO][4001] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.572 [INFO][4015] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.574 [INFO][4015] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.574 [INFO][4015] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.580 [WARNING][4015] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.580 [INFO][4015] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.583 [INFO][4015] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:04.585662 env[1255]: 2025-05-13 00:50:04.584 [INFO][4001] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:04.586328 env[1255]: time="2025-05-13T00:50:04.585771761Z" level=info msg="TearDown network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\" successfully" May 13 00:50:04.586328 env[1255]: time="2025-05-13T00:50:04.585791833Z" level=info msg="StopPodSandbox for \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\" returns successfully" May 13 00:50:04.586583 env[1255]: time="2025-05-13T00:50:04.586559811Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7pn4l,Uid:43f79210-2931-4b10-89eb-d5d1daf62487,Namespace:calico-system,Attempt:1,}" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.577 [INFO][4008] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.577 [INFO][4008] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" iface="eth0" netns="/var/run/netns/cni-ee5b1bbd-aced-fe05-2a56-3bea4450b146" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.578 [INFO][4008] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" iface="eth0" netns="/var/run/netns/cni-ee5b1bbd-aced-fe05-2a56-3bea4450b146" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.578 [INFO][4008] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" iface="eth0" netns="/var/run/netns/cni-ee5b1bbd-aced-fe05-2a56-3bea4450b146" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.578 [INFO][4008] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.578 [INFO][4008] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.599 [INFO][4024] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.600 [INFO][4024] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.600 [INFO][4024] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.604 [WARNING][4024] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.604 [INFO][4024] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.606 [INFO][4024] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:04.608441 env[1255]: 2025-05-13 00:50:04.607 [INFO][4008] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:04.609593 env[1255]: time="2025-05-13T00:50:04.608940824Z" level=info msg="TearDown network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\" successfully" May 13 00:50:04.609593 env[1255]: time="2025-05-13T00:50:04.608976037Z" level=info msg="StopPodSandbox for \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\" returns successfully" May 13 00:50:04.609593 env[1255]: time="2025-05-13T00:50:04.609490253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5654474c45-m4qdr,Uid:770c6e58-a9b2-4d68-8a22-9c0e004bf992,Namespace:calico-apiserver,Attempt:1,}" May 13 00:50:04.704702 systemd-networkd[1059]: calidb7c4e24652: Link UP May 13 00:50:04.710144 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:50:04.710208 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidb7c4e24652: link becomes ready May 13 00:50:04.710296 systemd-networkd[1059]: calidb7c4e24652: Gained carrier May 13 00:50:04.733622 systemd-networkd[1059]: cali745452efdf1: Link UP May 13 00:50:04.735757 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali745452efdf1: link becomes ready May 13 00:50:04.735229 systemd-networkd[1059]: cali745452efdf1: Gained carrier May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.654 [INFO][4042] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0 calico-apiserver-5654474c45- calico-apiserver 770c6e58-a9b2-4d68-8a22-9c0e004bf992 805 0 2025-05-13 00:49:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5654474c45 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5654474c45-m4qdr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali745452efdf1 [] []}} ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-m4qdr" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--m4qdr-" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.654 [INFO][4042] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-m4qdr" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.689 [INFO][4061] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" HandleID="k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.697 [INFO][4061] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" HandleID="k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000215810), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5654474c45-m4qdr", "timestamp":"2025-05-13 00:50:04.689645974 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.697 [INFO][4061] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.698 [INFO][4061] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.698 [INFO][4061] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.701 [INFO][4061] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.705 [INFO][4061] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.713 [INFO][4061] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.714 [INFO][4061] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.716 [INFO][4061] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.716 [INFO][4061] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.719 [INFO][4061] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28 May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.722 [INFO][4061] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.727 [INFO][4061] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.727 [INFO][4061] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" host="localhost" May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.727 [INFO][4061] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:04.745598 env[1255]: 2025-05-13 00:50:04.727 [INFO][4061] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" HandleID="k8s-pod-network.23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.746143 env[1255]: 2025-05-13 00:50:04.728 [INFO][4042] cni-plugin/k8s.go 386: Populated endpoint ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-m4qdr" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0", GenerateName:"calico-apiserver-5654474c45-", Namespace:"calico-apiserver", SelfLink:"", UID:"770c6e58-a9b2-4d68-8a22-9c0e004bf992", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5654474c45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5654474c45-m4qdr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali745452efdf1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:04.746143 env[1255]: 2025-05-13 00:50:04.728 [INFO][4042] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-m4qdr" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.746143 env[1255]: 2025-05-13 00:50:04.728 [INFO][4042] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali745452efdf1 ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-m4qdr" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.746143 env[1255]: 2025-05-13 00:50:04.735 [INFO][4042] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-m4qdr" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.746143 env[1255]: 2025-05-13 00:50:04.736 [INFO][4042] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-m4qdr" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0", GenerateName:"calico-apiserver-5654474c45-", Namespace:"calico-apiserver", SelfLink:"", UID:"770c6e58-a9b2-4d68-8a22-9c0e004bf992", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5654474c45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28", Pod:"calico-apiserver-5654474c45-m4qdr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali745452efdf1", MAC:"1a:a9:a6:74:7a:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:04.746143 env[1255]: 2025-05-13 00:50:04.743 [INFO][4042] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28" Namespace="calico-apiserver" Pod="calico-apiserver-5654474c45-m4qdr" WorkloadEndpoint="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.634 [INFO][4028] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--7pn4l-eth0 csi-node-driver- calico-system 43f79210-2931-4b10-89eb-d5d1daf62487 804 0 2025-05-13 00:49:39 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-7pn4l eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calidb7c4e24652 [] []}} ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Namespace="calico-system" Pod="csi-node-driver-7pn4l" WorkloadEndpoint="localhost-k8s-csi--node--driver--7pn4l-" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.634 [INFO][4028] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Namespace="calico-system" Pod="csi-node-driver-7pn4l" WorkloadEndpoint="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.661 [INFO][4052] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" HandleID="k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.669 [INFO][4052] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" HandleID="k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314f20), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-7pn4l", "timestamp":"2025-05-13 00:50:04.661665344 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.669 [INFO][4052] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.669 [INFO][4052] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.669 [INFO][4052] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.670 [INFO][4052] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.675 [INFO][4052] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.681 [INFO][4052] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.683 [INFO][4052] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.685 [INFO][4052] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.687 [INFO][4052] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.688 [INFO][4052] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.693 [INFO][4052] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.697 [INFO][4052] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.698 [INFO][4052] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" host="localhost" May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.698 [INFO][4052] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:04.750354 env[1255]: 2025-05-13 00:50:04.698 [INFO][4052] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" HandleID="k8s-pod-network.9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.751529 env[1255]: 2025-05-13 00:50:04.700 [INFO][4028] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Namespace="calico-system" Pod="csi-node-driver-7pn4l" WorkloadEndpoint="localhost-k8s-csi--node--driver--7pn4l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7pn4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"43f79210-2931-4b10-89eb-d5d1daf62487", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-7pn4l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidb7c4e24652", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:04.751529 env[1255]: 2025-05-13 00:50:04.700 [INFO][4028] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Namespace="calico-system" Pod="csi-node-driver-7pn4l" WorkloadEndpoint="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.751529 env[1255]: 2025-05-13 00:50:04.700 [INFO][4028] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidb7c4e24652 ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Namespace="calico-system" Pod="csi-node-driver-7pn4l" WorkloadEndpoint="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.751529 env[1255]: 2025-05-13 00:50:04.710 [INFO][4028] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Namespace="calico-system" Pod="csi-node-driver-7pn4l" WorkloadEndpoint="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.751529 env[1255]: 2025-05-13 00:50:04.718 [INFO][4028] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Namespace="calico-system" Pod="csi-node-driver-7pn4l" WorkloadEndpoint="localhost-k8s-csi--node--driver--7pn4l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7pn4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"43f79210-2931-4b10-89eb-d5d1daf62487", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e", Pod:"csi-node-driver-7pn4l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidb7c4e24652", MAC:"02:ef:dd:41:ff:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:04.751529 env[1255]: 2025-05-13 00:50:04.741 [INFO][4028] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e" Namespace="calico-system" Pod="csi-node-driver-7pn4l" WorkloadEndpoint="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:04.753000 audit[4087]: NETFILTER_CFG table=filter:104 family=2 entries=42 op=nft_register_chain pid=4087 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:04.753000 audit[4087]: SYSCALL arch=c000003e syscall=46 success=yes exit=21508 a0=3 a1=7fffba065750 a2=0 a3=7fffba06573c items=0 ppid=3370 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.753000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:04.767631 env[1255]: time="2025-05-13T00:50:04.767547825Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:50:04.767631 env[1255]: time="2025-05-13T00:50:04.767601874Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:50:04.769540 env[1255]: time="2025-05-13T00:50:04.767618779Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:50:04.771575 env[1255]: time="2025-05-13T00:50:04.771490635Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28 pid=4100 runtime=io.containerd.runc.v2 May 13 00:50:04.771000 audit[4118]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4118 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:04.771000 audit[4118]: SYSCALL arch=c000003e syscall=46 success=yes exit=22688 a0=3 a1=7ffe4850f8f0 a2=0 a3=7ffe4850f8dc items=0 ppid=3370 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.771000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:04.774363 env[1255]: time="2025-05-13T00:50:04.774273985Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:50:04.774433 env[1255]: time="2025-05-13T00:50:04.774374787Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:50:04.774433 env[1255]: time="2025-05-13T00:50:04.774400149Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:50:04.774679 env[1255]: time="2025-05-13T00:50:04.774605040Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e pid=4115 runtime=io.containerd.runc.v2 May 13 00:50:04.793305 systemd[1]: Started cri-containerd-23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28.scope. May 13 00:50:04.805315 systemd[1]: Started cri-containerd-9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e.scope. May 13 00:50:04.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit: BPF prog-id=175 op=LOAD May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4100 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643862643436346335303936643338343664393234336238313166 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4100 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643862643436346335303936643338343664393234336238313166 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit: BPF prog-id=176 op=LOAD May 13 00:50:04.811000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000108f80 items=0 ppid=4100 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643862643436346335303936643338343664393234336238313166 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit: BPF prog-id=177 op=LOAD May 13 00:50:04.811000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000108fc8 items=0 ppid=4100 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643862643436346335303936643338343664393234336238313166 May 13 00:50:04.811000 audit: BPF prog-id=177 op=UNLOAD May 13 00:50:04.811000 audit: BPF prog-id=176 op=UNLOAD May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.811000 audit: BPF prog-id=178 op=LOAD May 13 00:50:04.811000 audit[4122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001093d8 items=0 ppid=4100 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643862643436346335303936643338343664393234336238313166 May 13 00:50:04.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit: BPF prog-id=179 op=LOAD May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4115 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666163366336346333623761333639323638343633656632396330 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4115 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666163366336346333623761333639323638343633656632396330 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit: BPF prog-id=180 op=LOAD May 13 00:50:04.844000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002bfdc0 items=0 ppid=4115 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666163366336346333623761333639323638343633656632396330 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit: BPF prog-id=181 op=LOAD May 13 00:50:04.844000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002bfe08 items=0 ppid=4115 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666163366336346333623761333639323638343633656632396330 May 13 00:50:04.844000 audit: BPF prog-id=181 op=UNLOAD May 13 00:50:04.844000 audit: BPF prog-id=180 op=UNLOAD May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:04.844000 audit: BPF prog-id=182 op=LOAD May 13 00:50:04.844000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00040c218 items=0 ppid=4115 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:04.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666163366336346333623761333639323638343633656632396330 May 13 00:50:04.815642 systemd-resolved[1197]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:50:04.823767 systemd[1]: run-netns-cni\x2db418f235\x2d459c\x2dfe75\x2df38c\x2df91c4a87861d.mount: Deactivated successfully. May 13 00:50:04.823814 systemd[1]: run-netns-cni\x2dee5b1bbd\x2daced\x2dfe05\x2d2a56\x2d3bea4450b146.mount: Deactivated successfully. May 13 00:50:04.846770 systemd-resolved[1197]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:50:04.874448 env[1255]: time="2025-05-13T00:50:04.874412236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5654474c45-m4qdr,Uid:770c6e58-a9b2-4d68-8a22-9c0e004bf992,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28\"" May 13 00:50:04.874543 env[1255]: time="2025-05-13T00:50:04.874525936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7pn4l,Uid:43f79210-2931-4b10-89eb-d5d1daf62487,Namespace:calico-system,Attempt:1,} returns sandbox id \"9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e\"" May 13 00:50:04.886859 kubelet[2195]: I0513 00:50:04.877752 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-q5259" podStartSLOduration=31.857184462 podStartE2EDuration="31.857184462s" podCreationTimestamp="2025-05-13 00:49:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:50:04.857035007 +0000 UTC m=+42.622089434" watchObservedRunningTime="2025-05-13 00:50:04.857184462 +0000 UTC m=+42.622238885" May 13 00:50:04.980476 kubelet[2195]: I0513 00:50:04.980182 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-9zwh9" podStartSLOduration=31.980171559 podStartE2EDuration="31.980171559s" podCreationTimestamp="2025-05-13 00:49:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-13 00:50:04.98003781 +0000 UTC m=+42.745092236" watchObservedRunningTime="2025-05-13 00:50:04.980171559 +0000 UTC m=+42.745225985" May 13 00:50:05.053000 audit[4172]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=4172 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:05.053000 audit[4172]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffef33d7580 a2=0 a3=7ffef33d756c items=0 ppid=2331 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:05.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:05.057000 audit[4172]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4172 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:05.057000 audit[4172]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffef33d7580 a2=0 a3=7ffef33d756c items=0 ppid=2331 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:05.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:05.077000 audit[4175]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:05.077000 audit[4175]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd80ff4230 a2=0 a3=7ffd80ff421c items=0 ppid=2331 pid=4175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:05.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:05.092000 audit[4175]: NETFILTER_CFG table=nat:109 family=2 entries=56 op=nft_register_chain pid=4175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:05.092000 audit[4175]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd80ff4230 a2=0 a3=7ffd80ff421c items=0 ppid=2331 pid=4175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:05.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:05.512000 env[1255]: time="2025-05-13T00:50:05.511972731Z" level=info msg="StopPodSandbox for \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\"" May 13 00:50:05.579433 systemd-networkd[1059]: cali81094547881: Gained IPv6LL May 13 00:50:05.579616 systemd-networkd[1059]: cali8a59321c430: Gained IPv6LL May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.734 [INFO][4190] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.734 [INFO][4190] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" iface="eth0" netns="/var/run/netns/cni-354b8901-0a24-732b-e27a-02559a317940" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.735 [INFO][4190] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" iface="eth0" netns="/var/run/netns/cni-354b8901-0a24-732b-e27a-02559a317940" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.735 [INFO][4190] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" iface="eth0" netns="/var/run/netns/cni-354b8901-0a24-732b-e27a-02559a317940" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.735 [INFO][4190] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.735 [INFO][4190] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.762 [INFO][4197] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.762 [INFO][4197] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.762 [INFO][4197] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.769 [WARNING][4197] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.769 [INFO][4197] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.775 [INFO][4197] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:05.782085 env[1255]: 2025-05-13 00:50:05.779 [INFO][4190] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:05.782042 systemd[1]: run-netns-cni\x2d354b8901\x2d0a24\x2d732b\x2de27a\x2d02559a317940.mount: Deactivated successfully. May 13 00:50:05.782916 env[1255]: time="2025-05-13T00:50:05.782886461Z" level=info msg="TearDown network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\" successfully" May 13 00:50:05.782916 env[1255]: time="2025-05-13T00:50:05.782912640Z" level=info msg="StopPodSandbox for \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\" returns successfully" May 13 00:50:05.783377 env[1255]: time="2025-05-13T00:50:05.783358592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66f4c646c8-pcvzj,Uid:7a6987c0-057d-4829-baff-0ba8bb8eb7b6,Namespace:calico-system,Attempt:1,}" May 13 00:50:05.933205 systemd-networkd[1059]: calid2dfdf1c8af: Link UP May 13 00:50:05.935947 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 00:50:05.936111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid2dfdf1c8af: link becomes ready May 13 00:50:05.936133 systemd-networkd[1059]: calid2dfdf1c8af: Gained carrier May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.865 [INFO][4203] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0 calico-kube-controllers-66f4c646c8- calico-system 7a6987c0-057d-4829-baff-0ba8bb8eb7b6 831 0 2025-05-13 00:49:39 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:66f4c646c8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-66f4c646c8-pcvzj eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid2dfdf1c8af [] []}} ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Namespace="calico-system" Pod="calico-kube-controllers-66f4c646c8-pcvzj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.865 [INFO][4203] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Namespace="calico-system" Pod="calico-kube-controllers-66f4c646c8-pcvzj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.890 [INFO][4215] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" HandleID="k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.900 [INFO][4215] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" HandleID="k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f50b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-66f4c646c8-pcvzj", "timestamp":"2025-05-13 00:50:05.89026342 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.900 [INFO][4215] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.900 [INFO][4215] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.900 [INFO][4215] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.906 [INFO][4215] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.908 [INFO][4215] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.911 [INFO][4215] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.912 [INFO][4215] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.916 [INFO][4215] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.916 [INFO][4215] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.922 [INFO][4215] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.925 [INFO][4215] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.929 [INFO][4215] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.929 [INFO][4215] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" host="localhost" May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.929 [INFO][4215] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:05.946514 env[1255]: 2025-05-13 00:50:05.929 [INFO][4215] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" HandleID="k8s-pod-network.8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.947075 env[1255]: 2025-05-13 00:50:05.930 [INFO][4203] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Namespace="calico-system" Pod="calico-kube-controllers-66f4c646c8-pcvzj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0", GenerateName:"calico-kube-controllers-66f4c646c8-", Namespace:"calico-system", SelfLink:"", UID:"7a6987c0-057d-4829-baff-0ba8bb8eb7b6", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66f4c646c8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-66f4c646c8-pcvzj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid2dfdf1c8af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:05.947075 env[1255]: 2025-05-13 00:50:05.930 [INFO][4203] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Namespace="calico-system" Pod="calico-kube-controllers-66f4c646c8-pcvzj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.947075 env[1255]: 2025-05-13 00:50:05.930 [INFO][4203] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid2dfdf1c8af ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Namespace="calico-system" Pod="calico-kube-controllers-66f4c646c8-pcvzj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.947075 env[1255]: 2025-05-13 00:50:05.937 [INFO][4203] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Namespace="calico-system" Pod="calico-kube-controllers-66f4c646c8-pcvzj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.947075 env[1255]: 2025-05-13 00:50:05.937 [INFO][4203] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Namespace="calico-system" Pod="calico-kube-controllers-66f4c646c8-pcvzj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0", GenerateName:"calico-kube-controllers-66f4c646c8-", Namespace:"calico-system", SelfLink:"", UID:"7a6987c0-057d-4829-baff-0ba8bb8eb7b6", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66f4c646c8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd", Pod:"calico-kube-controllers-66f4c646c8-pcvzj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid2dfdf1c8af", MAC:"f2:18:8c:ed:da:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:05.947075 env[1255]: 2025-05-13 00:50:05.944 [INFO][4203] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd" Namespace="calico-system" Pod="calico-kube-controllers-66f4c646c8-pcvzj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:05.968000 audit[4236]: NETFILTER_CFG table=filter:110 family=2 entries=52 op=nft_register_chain pid=4236 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 00:50:05.968000 audit[4236]: SYSCALL arch=c000003e syscall=46 success=yes exit=25040 a0=3 a1=7ffd2c8e50e0 a2=0 a3=7ffd2c8e50cc items=0 ppid=3370 pid=4236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:05.968000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 00:50:05.974394 env[1255]: time="2025-05-13T00:50:05.974361678Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 00:50:05.974471 env[1255]: time="2025-05-13T00:50:05.974385637Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 00:50:05.974471 env[1255]: time="2025-05-13T00:50:05.974393052Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 00:50:05.974471 env[1255]: time="2025-05-13T00:50:05.974454334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd pid=4245 runtime=io.containerd.runc.v2 May 13 00:50:06.006206 systemd[1]: Started cri-containerd-8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd.scope. May 13 00:50:06.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit: BPF prog-id=183 op=LOAD May 13 00:50:06.016000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.016000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4245 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633738616139396265393766316530626433343339613364376434 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4245 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633738616139396265393766316530626433343339613364376434 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit: BPF prog-id=184 op=LOAD May 13 00:50:06.017000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a7040 items=0 ppid=4245 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633738616139396265393766316530626433343339613364376434 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.017000 audit: BPF prog-id=185 op=LOAD May 13 00:50:06.017000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a7088 items=0 ppid=4245 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633738616139396265393766316530626433343339613364376434 May 13 00:50:06.018000 audit: BPF prog-id=185 op=UNLOAD May 13 00:50:06.018000 audit: BPF prog-id=184 op=UNLOAD May 13 00:50:06.018000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.018000 audit: BPF prog-id=186 op=LOAD May 13 00:50:06.018000 audit[4255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a7498 items=0 ppid=4245 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862633738616139396265393766316530626433343339613364376434 May 13 00:50:06.022012 systemd-resolved[1197]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 13 00:50:06.047414 env[1255]: time="2025-05-13T00:50:06.045997774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-66f4c646c8-pcvzj,Uid:7a6987c0-057d-4829-baff-0ba8bb8eb7b6,Namespace:calico-system,Attempt:1,} returns sandbox id \"8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd\"" May 13 00:50:06.155451 systemd-networkd[1059]: cali745452efdf1: Gained IPv6LL May 13 00:50:06.453190 env[1255]: time="2025-05-13T00:50:06.453154304Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:06.454380 env[1255]: time="2025-05-13T00:50:06.454362546Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:06.455481 env[1255]: time="2025-05-13T00:50:06.455465225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:06.456700 env[1255]: time="2025-05-13T00:50:06.456682931Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:06.457465 env[1255]: time="2025-05-13T00:50:06.457399819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:50:06.459519 env[1255]: time="2025-05-13T00:50:06.459488419Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 13 00:50:06.461587 env[1255]: time="2025-05-13T00:50:06.461562153Z" level=info msg="CreateContainer within sandbox \"1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:50:06.466219 env[1255]: time="2025-05-13T00:50:06.466183485Z" level=info msg="CreateContainer within sandbox \"1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1fffae111eb08c06fa685539de634dfadbd0056a66995cf256dd542ce9bc43b7\"" May 13 00:50:06.483001 env[1255]: time="2025-05-13T00:50:06.482957582Z" level=info msg="StartContainer for \"1fffae111eb08c06fa685539de634dfadbd0056a66995cf256dd542ce9bc43b7\"" May 13 00:50:06.498127 systemd[1]: Started cri-containerd-1fffae111eb08c06fa685539de634dfadbd0056a66995cf256dd542ce9bc43b7.scope. May 13 00:50:06.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit: BPF prog-id=187 op=LOAD May 13 00:50:06.506000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.506000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3657 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666661653131316562303863303666613638353533396465363334 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3657 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666661653131316562303863303666613638353533396465363334 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit: BPF prog-id=188 op=LOAD May 13 00:50:06.507000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a5960 items=0 ppid=3657 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666661653131316562303863303666613638353533396465363334 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit: BPF prog-id=189 op=LOAD May 13 00:50:06.507000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a59a8 items=0 ppid=3657 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666661653131316562303863303666613638353533396465363334 May 13 00:50:06.507000 audit: BPF prog-id=189 op=UNLOAD May 13 00:50:06.507000 audit: BPF prog-id=188 op=UNLOAD May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:06.507000 audit: BPF prog-id=190 op=LOAD May 13 00:50:06.507000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a5db8 items=0 ppid=3657 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666661653131316562303863303666613638353533396465363334 May 13 00:50:06.536680 env[1255]: time="2025-05-13T00:50:06.536590939Z" level=info msg="StartContainer for \"1fffae111eb08c06fa685539de634dfadbd0056a66995cf256dd542ce9bc43b7\" returns successfully" May 13 00:50:06.667465 systemd-networkd[1059]: calidb7c4e24652: Gained IPv6LL May 13 00:50:06.839165 systemd[1]: run-containerd-runc-k8s.io-8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd-runc.ixbYAh.mount: Deactivated successfully. May 13 00:50:06.880000 audit[4317]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:06.880000 audit[4317]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc2fc74430 a2=0 a3=7ffc2fc7441c items=0 ppid=2331 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:06.885000 audit[4317]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4317 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:06.885000 audit[4317]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc2fc74430 a2=0 a3=7ffc2fc7441c items=0 ppid=2331 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:06.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:06.924993 env[1255]: time="2025-05-13T00:50:06.924949913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:06.925878 env[1255]: time="2025-05-13T00:50:06.925857071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:06.927005 env[1255]: time="2025-05-13T00:50:06.926986252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:06.928209 env[1255]: time="2025-05-13T00:50:06.928191754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:06.928748 env[1255]: time="2025-05-13T00:50:06.928648724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 13 00:50:06.930660 env[1255]: time="2025-05-13T00:50:06.929984373Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 00:50:06.941844 env[1255]: time="2025-05-13T00:50:06.941817935Z" level=info msg="CreateContainer within sandbox \"23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 13 00:50:06.949461 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4152223533.mount: Deactivated successfully. May 13 00:50:06.951206 env[1255]: time="2025-05-13T00:50:06.950686548Z" level=info msg="CreateContainer within sandbox \"23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8e6b804144c4387db9db7b62b16cb66f3bf4371595687c77e63f2c959cafb643\"" May 13 00:50:06.952323 env[1255]: time="2025-05-13T00:50:06.952303894Z" level=info msg="StartContainer for \"8e6b804144c4387db9db7b62b16cb66f3bf4371595687c77e63f2c959cafb643\"" May 13 00:50:06.988702 systemd[1]: Started cri-containerd-8e6b804144c4387db9db7b62b16cb66f3bf4371595687c77e63f2c959cafb643.scope. May 13 00:50:07.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.010000 audit: BPF prog-id=191 op=LOAD May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4100 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:07.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366238303431343463343338376462396462376236326231366362 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4100 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:07.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366238303431343463343338376462396462376236326231366362 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit: BPF prog-id=192 op=LOAD May 13 00:50:07.011000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002fbdc0 items=0 ppid=4100 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:07.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366238303431343463343338376462396462376236326231366362 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.011000 audit: BPF prog-id=193 op=LOAD May 13 00:50:07.011000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002fbe08 items=0 ppid=4100 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:07.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366238303431343463343338376462396462376236326231366362 May 13 00:50:07.011000 audit: BPF prog-id=193 op=UNLOAD May 13 00:50:07.011000 audit: BPF prog-id=192 op=UNLOAD May 13 00:50:07.012000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { perfmon } for pid=4325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit[4325]: AVC avc: denied { bpf } for pid=4325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:07.012000 audit: BPF prog-id=194 op=LOAD May 13 00:50:07.012000 audit[4325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000358218 items=0 ppid=4100 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:07.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865366238303431343463343338376462396462376236326231366362 May 13 00:50:07.019000 audit[4297]: AVC avc: denied { watch } for pid=4297 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_49_49.803328619/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c765 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c344,c765 tclass=file permissive=0 May 13 00:50:07.019000 audit[4297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000c1040 a2=fc6 a3=0 items=0 ppid=3657 pid=4297 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c765 key=(null) May 13 00:50:07.019000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:50:07.037046 env[1255]: time="2025-05-13T00:50:07.036992726Z" level=info msg="StartContainer for \"8e6b804144c4387db9db7b62b16cb66f3bf4371595687c77e63f2c959cafb643\" returns successfully" May 13 00:50:07.468000 audit[4336]: AVC avc: denied { watch } for pid=4336 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_49_49.789828823/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c79,c754 tclass=file permissive=0 May 13 00:50:07.468000 audit[4336]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bac800 a2=fc6 a3=0 items=0 ppid=4100 pid=4336 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c754 key=(null) May 13 00:50:07.468000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:50:07.874287 kubelet[2195]: I0513 00:50:07.874123 2195 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:50:07.882806 kubelet[2195]: I0513 00:50:07.882405 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5654474c45-ksfc4" podStartSLOduration=25.444867058 podStartE2EDuration="28.882391625s" podCreationTimestamp="2025-05-13 00:49:39 +0000 UTC" firstStartedPulling="2025-05-13 00:50:03.020837498 +0000 UTC m=+40.785891920" lastFinishedPulling="2025-05-13 00:50:06.458362063 +0000 UTC m=+44.223416487" observedRunningTime="2025-05-13 00:50:06.873310498 +0000 UTC m=+44.638364932" watchObservedRunningTime="2025-05-13 00:50:07.882391625 +0000 UTC m=+45.647446049" May 13 00:50:07.887000 audit[4356]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:07.887000 audit[4356]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc4a1850b0 a2=0 a3=7ffc4a18509c items=0 ppid=2331 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:07.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:07.892000 audit[4356]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:07.892000 audit[4356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc4a1850b0 a2=0 a3=7ffc4a18509c items=0 ppid=2331 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:07.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:07.947480 systemd-networkd[1059]: calid2dfdf1c8af: Gained IPv6LL May 13 00:50:08.874052 kubelet[2195]: I0513 00:50:08.874027 2195 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:50:08.980296 env[1255]: time="2025-05-13T00:50:08.980248771Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:08.981015 env[1255]: time="2025-05-13T00:50:08.980997485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:08.981808 env[1255]: time="2025-05-13T00:50:08.981794523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:08.982612 env[1255]: time="2025-05-13T00:50:08.982598249Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:08.982985 env[1255]: time="2025-05-13T00:50:08.982967266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 00:50:08.983738 env[1255]: time="2025-05-13T00:50:08.983717926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 13 00:50:08.985247 env[1255]: time="2025-05-13T00:50:08.985230052Z" level=info msg="CreateContainer within sandbox \"9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 00:50:08.996102 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount975937372.mount: Deactivated successfully. May 13 00:50:09.008717 env[1255]: time="2025-05-13T00:50:09.008697281Z" level=info msg="CreateContainer within sandbox \"9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a691a832e1258e0c0ce5ebb43e55c8b94aa2f876095a8e59af00e2326f0eaf81\"" May 13 00:50:09.009310 env[1255]: time="2025-05-13T00:50:09.009292165Z" level=info msg="StartContainer for \"a691a832e1258e0c0ce5ebb43e55c8b94aa2f876095a8e59af00e2326f0eaf81\"" May 13 00:50:09.031434 systemd[1]: Started cri-containerd-a691a832e1258e0c0ce5ebb43e55c8b94aa2f876095a8e59af00e2326f0eaf81.scope. May 13 00:50:09.039000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.041624 kernel: kauditd_printk_skb: 608 callbacks suppressed May 13 00:50:09.041667 kernel: audit: type=1400 audit(1747097409.039:1308): avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.044091 kernel: audit: type=1300 audit(1747097409.039:1308): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdf4c5c28c8 items=0 ppid=4115 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:09.039000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdf4c5c28c8 items=0 ppid=4115 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:09.051294 kernel: audit: type=1327 audit(1747097409.039:1308): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393161383332653132353865306330636535656262343365353563 May 13 00:50:09.051324 kernel: audit: type=1400 audit(1747097409.039:1309): avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393161383332653132353865306330636535656262343365353563 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.056144 kernel: audit: type=1400 audit(1747097409.039:1309): avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.056177 kernel: audit: type=1400 audit(1747097409.039:1309): avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.061063 kernel: audit: type=1400 audit(1747097409.039:1309): avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.061095 kernel: audit: type=1400 audit(1747097409.039:1309): avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.063357 kernel: audit: type=1400 audit(1747097409.039:1309): avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.039000 audit: BPF prog-id=195 op=LOAD May 13 00:50:09.039000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000284f18 items=0 ppid=4115 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:09.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393161383332653132353865306330636535656262343365353563 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.069419 kernel: audit: type=1400 audit(1747097409.039:1309): avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.046000 audit: BPF prog-id=196 op=LOAD May 13 00:50:09.046000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000284f68 items=0 ppid=4115 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:09.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393161383332653132353865306330636535656262343365353563 May 13 00:50:09.052000 audit: BPF prog-id=196 op=UNLOAD May 13 00:50:09.052000 audit: BPF prog-id=195 op=UNLOAD May 13 00:50:09.052000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:09.052000 audit: BPF prog-id=197 op=LOAD May 13 00:50:09.052000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000284ff8 items=0 ppid=4115 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:09.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136393161383332653132353865306330636535656262343365353563 May 13 00:50:09.081550 env[1255]: time="2025-05-13T00:50:09.081526823Z" level=info msg="StartContainer for \"a691a832e1258e0c0ce5ebb43e55c8b94aa2f876095a8e59af00e2326f0eaf81\" returns successfully" May 13 00:50:09.103191 kubelet[2195]: I0513 00:50:09.103153 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5654474c45-m4qdr" podStartSLOduration=28.06061079 podStartE2EDuration="30.103140935s" podCreationTimestamp="2025-05-13 00:49:39 +0000 UTC" firstStartedPulling="2025-05-13 00:50:04.886979342 +0000 UTC m=+42.652033762" lastFinishedPulling="2025-05-13 00:50:06.929509483 +0000 UTC m=+44.694563907" observedRunningTime="2025-05-13 00:50:07.884063172 +0000 UTC m=+45.649117615" watchObservedRunningTime="2025-05-13 00:50:09.103140935 +0000 UTC m=+46.868195361" May 13 00:50:09.123000 audit[4398]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:09.123000 audit[4398]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffce474e000 a2=0 a3=7ffce474dfec items=0 ppid=2331 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:09.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:09.128000 audit[4398]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:09.128000 audit[4398]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffce474e000 a2=0 a3=7ffce474dfec items=0 ppid=2331 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:09.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:09.993685 systemd[1]: run-containerd-runc-k8s.io-a691a832e1258e0c0ce5ebb43e55c8b94aa2f876095a8e59af00e2326f0eaf81-runc.JFYYH0.mount: Deactivated successfully. May 13 00:50:11.789213 env[1255]: time="2025-05-13T00:50:11.789149276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:11.790450 env[1255]: time="2025-05-13T00:50:11.790426404Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:11.791796 env[1255]: time="2025-05-13T00:50:11.791771699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:11.792578 env[1255]: time="2025-05-13T00:50:11.792552975Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:11.793080 env[1255]: time="2025-05-13T00:50:11.793031786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 13 00:50:11.796355 env[1255]: time="2025-05-13T00:50:11.794499016Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 00:50:11.849751 env[1255]: time="2025-05-13T00:50:11.849719634Z" level=info msg="CreateContainer within sandbox \"8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 13 00:50:11.863310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3174428233.mount: Deactivated successfully. May 13 00:50:11.865815 env[1255]: time="2025-05-13T00:50:11.865788545Z" level=info msg="CreateContainer within sandbox \"8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"bc538d684d55e1c4e066dc381e9f9434f54520d0dc2229ce881fcded493c8c57\"" May 13 00:50:11.866464 env[1255]: time="2025-05-13T00:50:11.866452007Z" level=info msg="StartContainer for \"bc538d684d55e1c4e066dc381e9f9434f54520d0dc2229ce881fcded493c8c57\"" May 13 00:50:11.888928 systemd[1]: Started cri-containerd-bc538d684d55e1c4e066dc381e9f9434f54520d0dc2229ce881fcded493c8c57.scope. May 13 00:50:11.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.910000 audit: BPF prog-id=198 op=LOAD May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4245 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:11.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353338643638346435356531633465303636646333383165396639 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4245 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:11.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353338643638346435356531633465303636646333383165396639 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit: BPF prog-id=199 op=LOAD May 13 00:50:11.911000 audit[4410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000210550 items=0 ppid=4245 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:11.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353338643638346435356531633465303636646333383165396639 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit: BPF prog-id=200 op=LOAD May 13 00:50:11.911000 audit[4410]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000210598 items=0 ppid=4245 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:11.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353338643638346435356531633465303636646333383165396639 May 13 00:50:11.911000 audit: BPF prog-id=200 op=UNLOAD May 13 00:50:11.911000 audit: BPF prog-id=199 op=UNLOAD May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { perfmon } for pid=4410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit[4410]: AVC avc: denied { bpf } for pid=4410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:11.911000 audit: BPF prog-id=201 op=LOAD May 13 00:50:11.911000 audit[4410]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002109a8 items=0 ppid=4245 pid=4410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:11.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353338643638346435356531633465303636646333383165396639 May 13 00:50:11.992010 env[1255]: time="2025-05-13T00:50:11.957047798Z" level=info msg="StartContainer for \"bc538d684d55e1c4e066dc381e9f9434f54520d0dc2229ce881fcded493c8c57\" returns successfully" May 13 00:50:13.075665 kubelet[2195]: I0513 00:50:13.075643 2195 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:50:13.705873 env[1255]: time="2025-05-13T00:50:13.705847251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:13.706569 env[1255]: time="2025-05-13T00:50:13.706552233Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:13.707372 env[1255]: time="2025-05-13T00:50:13.707359464Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:13.708059 env[1255]: time="2025-05-13T00:50:13.708043642Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 00:50:13.708466 env[1255]: time="2025-05-13T00:50:13.708448373Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 00:50:13.724375 env[1255]: time="2025-05-13T00:50:13.724039814Z" level=info msg="CreateContainer within sandbox \"9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 00:50:13.732041 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1843798839.mount: Deactivated successfully. May 13 00:50:13.734546 env[1255]: time="2025-05-13T00:50:13.734522590Z" level=info msg="CreateContainer within sandbox \"9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ebde9c3352a4730c9845f71e53eae4e4285c7ba6566a7e2f75abd28f4d594433\"" May 13 00:50:13.736721 env[1255]: time="2025-05-13T00:50:13.736709582Z" level=info msg="StartContainer for \"ebde9c3352a4730c9845f71e53eae4e4285c7ba6566a7e2f75abd28f4d594433\"" May 13 00:50:13.754081 systemd[1]: Started cri-containerd-ebde9c3352a4730c9845f71e53eae4e4285c7ba6566a7e2f75abd28f4d594433.scope. May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa1b1905138 items=0 ppid=4115 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:13.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646539633333353261343733306339383435663731653533656165 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit: BPF prog-id=202 op=LOAD May 13 00:50:13.768000 audit[4442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000383c58 items=0 ppid=4115 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:13.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646539633333353261343733306339383435663731653533656165 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit: BPF prog-id=203 op=LOAD May 13 00:50:13.768000 audit[4442]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000383ca8 items=0 ppid=4115 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:13.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646539633333353261343733306339383435663731653533656165 May 13 00:50:13.768000 audit: BPF prog-id=203 op=UNLOAD May 13 00:50:13.768000 audit: BPF prog-id=202 op=UNLOAD May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 00:50:13.768000 audit: BPF prog-id=204 op=LOAD May 13 00:50:13.768000 audit[4442]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000383d38 items=0 ppid=4115 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:13.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646539633333353261343733306339383435663731653533656165 May 13 00:50:13.785216 env[1255]: time="2025-05-13T00:50:13.785186727Z" level=info msg="StartContainer for \"ebde9c3352a4730c9845f71e53eae4e4285c7ba6566a7e2f75abd28f4d594433\" returns successfully" May 13 00:50:13.840418 systemd[1]: run-containerd-runc-k8s.io-ebde9c3352a4730c9845f71e53eae4e4285c7ba6566a7e2f75abd28f4d594433-runc.ehPTYJ.mount: Deactivated successfully. May 13 00:50:14.090536 kubelet[2195]: I0513 00:50:14.090453 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-7pn4l" podStartSLOduration=26.262180304 podStartE2EDuration="35.090433598s" podCreationTimestamp="2025-05-13 00:49:39 +0000 UTC" firstStartedPulling="2025-05-13 00:50:04.887151516 +0000 UTC m=+42.652205939" lastFinishedPulling="2025-05-13 00:50:13.715404811 +0000 UTC m=+51.480459233" observedRunningTime="2025-05-13 00:50:14.089974918 +0000 UTC m=+51.855029357" watchObservedRunningTime="2025-05-13 00:50:14.090433598 +0000 UTC m=+51.855488030" May 13 00:50:14.091038 kubelet[2195]: I0513 00:50:14.091007 2195 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-66f4c646c8-pcvzj" podStartSLOduration=29.352548396 podStartE2EDuration="35.090998841s" podCreationTimestamp="2025-05-13 00:49:39 +0000 UTC" firstStartedPulling="2025-05-13 00:50:06.055468578 +0000 UTC m=+43.820522997" lastFinishedPulling="2025-05-13 00:50:11.793919014 +0000 UTC m=+49.558973442" observedRunningTime="2025-05-13 00:50:12.099424939 +0000 UTC m=+49.864479383" watchObservedRunningTime="2025-05-13 00:50:14.090998841 +0000 UTC m=+51.856053277" May 13 00:50:14.737512 kubelet[2195]: I0513 00:50:14.736565 2195 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 00:50:14.737668 kubelet[2195]: I0513 00:50:14.737660 2195 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 00:50:15.691000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:15.693983 kernel: kauditd_printk_skb: 139 callbacks suppressed May 13 00:50:15.701288 kernel: audit: type=1400 audit(1747097415.691:1340): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:15.705291 kernel: audit: type=1400 audit(1747097415.691:1341): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:15.705314 kernel: audit: type=1300 audit(1747097415.691:1341): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028f2b40 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:15.708609 kernel: audit: type=1327 audit(1747097415.691:1341): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:15.708633 kernel: audit: type=1300 audit(1747097415.691:1340): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268e900 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:15.691000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:15.712539 kernel: audit: type=1327 audit(1747097415.691:1340): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:15.691000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028f2b40 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:15.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:15.691000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268e900 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:15.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:15.931531 kubelet[2195]: I0513 00:50:15.931509 2195 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:50:16.005881 systemd[1]: run-containerd-runc-k8s.io-bc538d684d55e1c4e066dc381e9f9434f54520d0dc2229ce881fcded493c8c57-runc.yTDmvz.mount: Deactivated successfully. May 13 00:50:16.554000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:16.554000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00c452740 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:50:16.563913 kernel: audit: type=1400 audit(1747097416.554:1342): avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:16.563958 kernel: audit: type=1300 audit(1747097416.554:1342): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00c452740 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:50:16.563986 kernel: audit: type=1327 audit(1747097416.554:1342): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:50:16.554000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:50:16.567295 kernel: audit: type=1400 audit(1747097416.554:1343): avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:16.554000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:16.554000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00a834480 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:50:16.554000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:50:16.558000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:16.558000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a8344b0 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:50:16.558000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:50:16.570000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:16.570000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a834540 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:50:16.570000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:50:16.613000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:16.613000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00bbd5c00 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:50:16.613000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:50:16.613000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:16.613000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00b94e300 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:50:16.613000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:50:17.001703 systemd[1]: run-containerd-runc-k8s.io-bc538d684d55e1c4e066dc381e9f9434f54520d0dc2229ce881fcded493c8c57-runc.Qlc0Qn.mount: Deactivated successfully. May 13 00:50:20.858000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:20.860920 kernel: kauditd_printk_skb: 14 callbacks suppressed May 13 00:50:20.861053 kernel: audit: type=1400 audit(1747097420.858:1348): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:20.859000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:20.868258 kernel: audit: type=1400 audit(1747097420.859:1349): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:20.868647 kernel: audit: type=1300 audit(1747097420.859:1349): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00268efc0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:20.859000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00268efc0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:20.859000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:20.858000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268ef60 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:20.879631 kernel: audit: type=1327 audit(1747097420.859:1349): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:20.879665 kernel: audit: type=1300 audit(1747097420.858:1348): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00268ef60 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:20.858000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:20.882996 kernel: audit: type=1327 audit(1747097420.858:1348): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:20.883027 kernel: audit: type=1400 audit(1747097420.862:1350): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:20.862000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:20.862000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025f1c60 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:20.889917 kernel: audit: type=1300 audit(1747097420.862:1350): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025f1c60 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:20.889951 kernel: audit: type=1327 audit(1747097420.862:1350): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:20.862000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:20.862000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:20.896170 kernel: audit: type=1400 audit(1747097420.862:1351): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:50:20.862000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025f1c80 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:50:20.862000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:50:22.559625 env[1255]: time="2025-05-13T00:50:22.559421045Z" level=info msg="StopPodSandbox for \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\"" May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:22.883 [WARNING][4540] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0", GenerateName:"calico-apiserver-5654474c45-", Namespace:"calico-apiserver", SelfLink:"", UID:"45112d4a-c89d-4585-b353-ba665063d926", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5654474c45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96", Pod:"calico-apiserver-5654474c45-ksfc4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0aef133dc14", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:22.885 [INFO][4540] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:22.885 [INFO][4540] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" iface="eth0" netns="" May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:22.885 [INFO][4540] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:22.885 [INFO][4540] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:23.164 [INFO][4547] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:23.167 [INFO][4547] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:23.167 [INFO][4547] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:23.183 [WARNING][4547] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:23.183 [INFO][4547] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:23.185 [INFO][4547] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.188054 env[1255]: 2025-05-13 00:50:23.186 [INFO][4540] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:23.198471 env[1255]: time="2025-05-13T00:50:23.188327343Z" level=info msg="TearDown network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\" successfully" May 13 00:50:23.198471 env[1255]: time="2025-05-13T00:50:23.188364619Z" level=info msg="StopPodSandbox for \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\" returns successfully" May 13 00:50:23.205727 env[1255]: time="2025-05-13T00:50:23.205705348Z" level=info msg="RemovePodSandbox for \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\"" May 13 00:50:23.205862 env[1255]: time="2025-05-13T00:50:23.205829421Z" level=info msg="Forcibly stopping sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\"" May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.274 [WARNING][4567] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0", GenerateName:"calico-apiserver-5654474c45-", Namespace:"calico-apiserver", SelfLink:"", UID:"45112d4a-c89d-4585-b353-ba665063d926", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5654474c45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1744dad05ba3809ce2333903a030d7d4c22b31fe681c9a11887c8bcf8557aa96", Pod:"calico-apiserver-5654474c45-ksfc4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0aef133dc14", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.275 [INFO][4567] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.275 [INFO][4567] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" iface="eth0" netns="" May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.275 [INFO][4567] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.275 [INFO][4567] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.288 [INFO][4575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.288 [INFO][4575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.288 [INFO][4575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.294 [WARNING][4575] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.294 [INFO][4575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" HandleID="k8s-pod-network.61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" Workload="localhost-k8s-calico--apiserver--5654474c45--ksfc4-eth0" May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.295 [INFO][4575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.298606 env[1255]: 2025-05-13 00:50:23.296 [INFO][4567] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d" May 13 00:50:23.299070 env[1255]: time="2025-05-13T00:50:23.299048801Z" level=info msg="TearDown network for sandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\" successfully" May 13 00:50:23.300899 env[1255]: time="2025-05-13T00:50:23.300884072Z" level=info msg="RemovePodSandbox \"61d961d6343d0a130e16dea4036da9030e82fe8cae40f8fc9e133769cecb0d1d\" returns successfully" May 13 00:50:23.301419 env[1255]: time="2025-05-13T00:50:23.301389454Z" level=info msg="StopPodSandbox for \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\"" May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.326 [WARNING][4594] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b32c0982-4af4-4a32-bebb-0f2cccf5d98b", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4", Pod:"coredns-7db6d8ff4d-9zwh9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8a59321c430", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.326 [INFO][4594] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.326 [INFO][4594] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" iface="eth0" netns="" May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.326 [INFO][4594] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.326 [INFO][4594] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.342 [INFO][4601] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.342 [INFO][4601] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.342 [INFO][4601] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.345 [WARNING][4601] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.345 [INFO][4601] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.346 [INFO][4601] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.348664 env[1255]: 2025-05-13 00:50:23.347 [INFO][4594] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:23.349534 env[1255]: time="2025-05-13T00:50:23.349049637Z" level=info msg="TearDown network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\" successfully" May 13 00:50:23.349534 env[1255]: time="2025-05-13T00:50:23.349077712Z" level=info msg="StopPodSandbox for \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\" returns successfully" May 13 00:50:23.349534 env[1255]: time="2025-05-13T00:50:23.349414918Z" level=info msg="RemovePodSandbox for \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\"" May 13 00:50:23.349534 env[1255]: time="2025-05-13T00:50:23.349440048Z" level=info msg="Forcibly stopping sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\"" May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.373 [WARNING][4620] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"b32c0982-4af4-4a32-bebb-0f2cccf5d98b", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3f84584d1b795c3f52a684c2ff8f6fa8e15d3700c3ce1f137d273743ecba48f4", Pod:"coredns-7db6d8ff4d-9zwh9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8a59321c430", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.373 [INFO][4620] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.373 [INFO][4620] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" iface="eth0" netns="" May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.373 [INFO][4620] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.373 [INFO][4620] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.387 [INFO][4627] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.387 [INFO][4627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.387 [INFO][4627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.391 [WARNING][4627] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.391 [INFO][4627] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" HandleID="k8s-pod-network.1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" Workload="localhost-k8s-coredns--7db6d8ff4d--9zwh9-eth0" May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.392 [INFO][4627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.394392 env[1255]: 2025-05-13 00:50:23.393 [INFO][4620] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7" May 13 00:50:23.450205 env[1255]: time="2025-05-13T00:50:23.394803638Z" level=info msg="TearDown network for sandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\" successfully" May 13 00:50:23.457503 env[1255]: time="2025-05-13T00:50:23.457475589Z" level=info msg="RemovePodSandbox \"1c920b5d4dc8ccea9686262ebb0d4852ad564accf5e895e5fe9c7207b5c2ecf7\" returns successfully" May 13 00:50:23.458017 env[1255]: time="2025-05-13T00:50:23.457986277Z" level=info msg="StopPodSandbox for \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\"" May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.498 [WARNING][4645] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0", GenerateName:"calico-apiserver-5654474c45-", Namespace:"calico-apiserver", SelfLink:"", UID:"770c6e58-a9b2-4d68-8a22-9c0e004bf992", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5654474c45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28", Pod:"calico-apiserver-5654474c45-m4qdr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali745452efdf1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.498 [INFO][4645] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.498 [INFO][4645] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" iface="eth0" netns="" May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.498 [INFO][4645] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.498 [INFO][4645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.528 [INFO][4654] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.528 [INFO][4654] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.528 [INFO][4654] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.532 [WARNING][4654] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.532 [INFO][4654] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.533 [INFO][4654] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.535878 env[1255]: 2025-05-13 00:50:23.534 [INFO][4645] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:23.536387 env[1255]: time="2025-05-13T00:50:23.536366037Z" level=info msg="TearDown network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\" successfully" May 13 00:50:23.536452 env[1255]: time="2025-05-13T00:50:23.536440356Z" level=info msg="StopPodSandbox for \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\" returns successfully" May 13 00:50:23.536795 env[1255]: time="2025-05-13T00:50:23.536767176Z" level=info msg="RemovePodSandbox for \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\"" May 13 00:50:23.536886 env[1255]: time="2025-05-13T00:50:23.536844228Z" level=info msg="Forcibly stopping sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\"" May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.559 [WARNING][4673] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0", GenerateName:"calico-apiserver-5654474c45-", Namespace:"calico-apiserver", SelfLink:"", UID:"770c6e58-a9b2-4d68-8a22-9c0e004bf992", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5654474c45", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"23d8bd464c5096d3846d9243b811f5c617ec8266bd14749c3082f6c503048e28", Pod:"calico-apiserver-5654474c45-m4qdr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali745452efdf1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.559 [INFO][4673] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.559 [INFO][4673] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" iface="eth0" netns="" May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.559 [INFO][4673] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.559 [INFO][4673] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.576 [INFO][4680] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.576 [INFO][4680] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.576 [INFO][4680] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.581 [WARNING][4680] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.581 [INFO][4680] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" HandleID="k8s-pod-network.9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" Workload="localhost-k8s-calico--apiserver--5654474c45--m4qdr-eth0" May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.582 [INFO][4680] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.584380 env[1255]: 2025-05-13 00:50:23.583 [INFO][4673] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4" May 13 00:50:23.586131 env[1255]: time="2025-05-13T00:50:23.584846723Z" level=info msg="TearDown network for sandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\" successfully" May 13 00:50:23.586523 env[1255]: time="2025-05-13T00:50:23.586509515Z" level=info msg="RemovePodSandbox \"9ca5ad1b1e506190e9f57ef5f7ca3aebff27be79ad9d45b993625d12f50769e4\" returns successfully" May 13 00:50:23.586871 env[1255]: time="2025-05-13T00:50:23.586858710Z" level=info msg="StopPodSandbox for \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\"" May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.609 [WARNING][4698] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0", GenerateName:"calico-kube-controllers-66f4c646c8-", Namespace:"calico-system", SelfLink:"", UID:"7a6987c0-057d-4829-baff-0ba8bb8eb7b6", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66f4c646c8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd", Pod:"calico-kube-controllers-66f4c646c8-pcvzj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid2dfdf1c8af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.609 [INFO][4698] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.610 [INFO][4698] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" iface="eth0" netns="" May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.610 [INFO][4698] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.610 [INFO][4698] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.624 [INFO][4705] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.624 [INFO][4705] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.624 [INFO][4705] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.628 [WARNING][4705] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.628 [INFO][4705] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.629 [INFO][4705] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.631776 env[1255]: 2025-05-13 00:50:23.630 [INFO][4698] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:23.632939 env[1255]: time="2025-05-13T00:50:23.631803137Z" level=info msg="TearDown network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\" successfully" May 13 00:50:23.632939 env[1255]: time="2025-05-13T00:50:23.631831666Z" level=info msg="StopPodSandbox for \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\" returns successfully" May 13 00:50:23.632939 env[1255]: time="2025-05-13T00:50:23.632217617Z" level=info msg="RemovePodSandbox for \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\"" May 13 00:50:23.632939 env[1255]: time="2025-05-13T00:50:23.632239422Z" level=info msg="Forcibly stopping sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\"" May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.655 [WARNING][4725] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0", GenerateName:"calico-kube-controllers-66f4c646c8-", Namespace:"calico-system", SelfLink:"", UID:"7a6987c0-057d-4829-baff-0ba8bb8eb7b6", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"66f4c646c8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8bc78aa99be97f1e0bd3439a3d7d42b05e36eaadd1a6a0830d7b4c088b9077bd", Pod:"calico-kube-controllers-66f4c646c8-pcvzj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid2dfdf1c8af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.655 [INFO][4725] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.655 [INFO][4725] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" iface="eth0" netns="" May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.655 [INFO][4725] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.655 [INFO][4725] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.670 [INFO][4732] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.671 [INFO][4732] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.671 [INFO][4732] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.674 [WARNING][4732] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.674 [INFO][4732] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" HandleID="k8s-pod-network.f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" Workload="localhost-k8s-calico--kube--controllers--66f4c646c8--pcvzj-eth0" May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.675 [INFO][4732] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.678097 env[1255]: 2025-05-13 00:50:23.676 [INFO][4725] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb" May 13 00:50:23.678747 env[1255]: time="2025-05-13T00:50:23.678116508Z" level=info msg="TearDown network for sandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\" successfully" May 13 00:50:23.679463 env[1255]: time="2025-05-13T00:50:23.679445810Z" level=info msg="RemovePodSandbox \"f81662c186c4baaa47f98856eaf0e44979799efc509d0aadf23a19987666c1bb\" returns successfully" May 13 00:50:23.679762 env[1255]: time="2025-05-13T00:50:23.679748170Z" level=info msg="StopPodSandbox for \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\"" May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.702 [WARNING][4751] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--q5259-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d9d08b03-9a02-4ef4-a779-323f8aef023c", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46", Pod:"coredns-7db6d8ff4d-q5259", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali81094547881", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.703 [INFO][4751] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.703 [INFO][4751] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" iface="eth0" netns="" May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.703 [INFO][4751] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.703 [INFO][4751] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.719 [INFO][4759] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.719 [INFO][4759] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.719 [INFO][4759] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.724 [WARNING][4759] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.724 [INFO][4759] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.725 [INFO][4759] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.728045 env[1255]: 2025-05-13 00:50:23.726 [INFO][4751] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:23.728045 env[1255]: time="2025-05-13T00:50:23.728012682Z" level=info msg="TearDown network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\" successfully" May 13 00:50:23.729457 env[1255]: time="2025-05-13T00:50:23.728033540Z" level=info msg="StopPodSandbox for \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\" returns successfully" May 13 00:50:23.729611 env[1255]: time="2025-05-13T00:50:23.729595888Z" level=info msg="RemovePodSandbox for \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\"" May 13 00:50:23.729746 env[1255]: time="2025-05-13T00:50:23.729711345Z" level=info msg="Forcibly stopping sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\"" May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.753 [WARNING][4777] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--q5259-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d9d08b03-9a02-4ef4-a779-323f8aef023c", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c231feb5c8ab8fba357cabb846491b0ca4d3eece5ae87771197e2939707fef46", Pod:"coredns-7db6d8ff4d-q5259", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali81094547881", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.754 [INFO][4777] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.754 [INFO][4777] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" iface="eth0" netns="" May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.754 [INFO][4777] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.754 [INFO][4777] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.768 [INFO][4784] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.768 [INFO][4784] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.768 [INFO][4784] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.772 [WARNING][4784] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.772 [INFO][4784] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" HandleID="k8s-pod-network.ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" Workload="localhost-k8s-coredns--7db6d8ff4d--q5259-eth0" May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.773 [INFO][4784] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.775808 env[1255]: 2025-05-13 00:50:23.774 [INFO][4777] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56" May 13 00:50:23.776170 env[1255]: time="2025-05-13T00:50:23.775825950Z" level=info msg="TearDown network for sandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\" successfully" May 13 00:50:23.777414 env[1255]: time="2025-05-13T00:50:23.777396915Z" level=info msg="RemovePodSandbox \"ca95d3a12b29d45cdd9dc7d41749e63c4758a93d722f1182863a552390d1fe56\" returns successfully" May 13 00:50:23.777795 env[1255]: time="2025-05-13T00:50:23.777780078Z" level=info msg="StopPodSandbox for \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\"" May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.801 [WARNING][4802] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7pn4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"43f79210-2931-4b10-89eb-d5d1daf62487", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e", Pod:"csi-node-driver-7pn4l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidb7c4e24652", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.801 [INFO][4802] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.801 [INFO][4802] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" iface="eth0" netns="" May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.801 [INFO][4802] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.801 [INFO][4802] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.814 [INFO][4810] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.814 [INFO][4810] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.815 [INFO][4810] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.818 [WARNING][4810] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.819 [INFO][4810] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.819 [INFO][4810] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.821970 env[1255]: 2025-05-13 00:50:23.820 [INFO][4802] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:23.822777 env[1255]: time="2025-05-13T00:50:23.822300835Z" level=info msg="TearDown network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\" successfully" May 13 00:50:23.822777 env[1255]: time="2025-05-13T00:50:23.822324104Z" level=info msg="StopPodSandbox for \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\" returns successfully" May 13 00:50:23.822777 env[1255]: time="2025-05-13T00:50:23.822680491Z" level=info msg="RemovePodSandbox for \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\"" May 13 00:50:23.822777 env[1255]: time="2025-05-13T00:50:23.822698581Z" level=info msg="Forcibly stopping sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\"" May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.849 [WARNING][4828] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7pn4l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"43f79210-2931-4b10-89eb-d5d1daf62487", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 0, 49, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9afac6c64c3b7a369268463ef29c02787c45f27e41240c909716397850468a2e", Pod:"csi-node-driver-7pn4l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidb7c4e24652", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.850 [INFO][4828] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.850 [INFO][4828] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" iface="eth0" netns="" May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.850 [INFO][4828] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.850 [INFO][4828] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.865 [INFO][4835] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.865 [INFO][4835] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.865 [INFO][4835] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.869 [WARNING][4835] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.869 [INFO][4835] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" HandleID="k8s-pod-network.459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" Workload="localhost-k8s-csi--node--driver--7pn4l-eth0" May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.870 [INFO][4835] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 00:50:23.872410 env[1255]: 2025-05-13 00:50:23.871 [INFO][4828] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1" May 13 00:50:23.872891 env[1255]: time="2025-05-13T00:50:23.872870232Z" level=info msg="TearDown network for sandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\" successfully" May 13 00:50:23.874260 env[1255]: time="2025-05-13T00:50:23.874246153Z" level=info msg="RemovePodSandbox \"459c8e33f84f1a5fde219b98fbd72b47fd24e08f67f4236c7a5ac73ace69ddf1\" returns successfully" May 13 00:50:28.721094 kubelet[2195]: I0513 00:50:28.721071 2195 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 13 00:50:28.799000 audit[4846]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:28.802670 kernel: kauditd_printk_skb: 2 callbacks suppressed May 13 00:50:28.802714 kernel: audit: type=1325 audit(1747097428.799:1352): table=filter:117 family=2 entries=8 op=nft_register_rule pid=4846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:28.799000 audit[4846]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc4bc978e0 a2=0 a3=7ffc4bc978cc items=0 ppid=2331 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:28.807049 kernel: audit: type=1300 audit(1747097428.799:1352): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc4bc978e0 a2=0 a3=7ffc4bc978cc items=0 ppid=2331 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:28.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:28.808911 kernel: audit: type=1327 audit(1747097428.799:1352): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:28.806000 audit[4846]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=4846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:28.810822 kernel: audit: type=1325 audit(1747097428.806:1353): table=nat:118 family=2 entries=34 op=nft_register_chain pid=4846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:50:28.806000 audit[4846]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc4bc978e0 a2=0 a3=7ffc4bc978cc items=0 ppid=2331 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:28.814651 kernel: audit: type=1300 audit(1747097428.806:1353): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc4bc978e0 a2=0 a3=7ffc4bc978cc items=0 ppid=2331 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:28.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:28.816500 kernel: audit: type=1327 audit(1747097428.806:1353): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:50:28.930408 systemd[1]: run-containerd-runc-k8s.io-962f0327c39484bddf104a356ef101e2f3f0f0c3056be0ef038f683f2cca3cc4-runc.v57OCp.mount: Deactivated successfully. May 13 00:50:38.729779 systemd[1]: Started sshd@7-139.178.70.103:22-147.75.109.163:51054.service. May 13 00:50:38.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.103:22-147.75.109.163:51054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:38.736640 kernel: audit: type=1130 audit(1747097438.731:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.103:22-147.75.109.163:51054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:38.863000 audit[4887]: USER_ACCT pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:38.867765 sshd[4887]: Accepted publickey for core from 147.75.109.163 port 51054 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:50:38.870412 kernel: audit: type=1101 audit(1747097438.863:1355): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:38.870000 audit[4887]: CRED_ACQ pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:38.882004 kernel: audit: type=1103 audit(1747097438.870:1356): pid=4887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:38.882674 kernel: audit: type=1006 audit(1747097438.870:1357): pid=4887 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 13 00:50:38.882702 kernel: audit: type=1300 audit(1747097438.870:1357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7844d6e0 a2=3 a3=0 items=0 ppid=1 pid=4887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:38.882720 kernel: audit: type=1327 audit(1747097438.870:1357): proctitle=737368643A20636F7265205B707269765D May 13 00:50:38.870000 audit[4887]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7844d6e0 a2=3 a3=0 items=0 ppid=1 pid=4887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:38.870000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:50:38.876903 sshd[4887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:38.904425 systemd-logind[1240]: New session 10 of user core. May 13 00:50:38.905608 systemd[1]: Started session-10.scope. May 13 00:50:38.909000 audit[4887]: USER_START pid=4887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:38.910000 audit[4889]: CRED_ACQ pid=4889 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:38.917237 kernel: audit: type=1105 audit(1747097438.909:1358): pid=4887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:38.917280 kernel: audit: type=1103 audit(1747097438.910:1359): pid=4889 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:39.457459 sshd[4887]: pam_unix(sshd:session): session closed for user core May 13 00:50:39.457000 audit[4887]: USER_END pid=4887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:39.461000 audit[4887]: CRED_DISP pid=4887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:39.465055 kernel: audit: type=1106 audit(1747097439.457:1360): pid=4887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:39.465105 kernel: audit: type=1104 audit(1747097439.461:1361): pid=4887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:39.467488 systemd[1]: sshd@7-139.178.70.103:22-147.75.109.163:51054.service: Deactivated successfully. May 13 00:50:39.469314 systemd[1]: session-10.scope: Deactivated successfully. May 13 00:50:39.470113 systemd-logind[1240]: Session 10 logged out. Waiting for processes to exit. May 13 00:50:39.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.103:22-147.75.109.163:51054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:39.470746 systemd-logind[1240]: Removed session 10. May 13 00:50:44.478637 systemd[1]: Started sshd@8-139.178.70.103:22-147.75.109.163:51070.service. May 13 00:50:44.485912 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:50:44.503236 kernel: audit: type=1130 audit(1747097444.478:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.103:22-147.75.109.163:51070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:44.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.103:22-147.75.109.163:51070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:44.657000 audit[4923]: USER_ACCT pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.662553 sshd[4923]: Accepted publickey for core from 147.75.109.163 port 51070 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:50:44.668302 kernel: audit: type=1101 audit(1747097444.657:1364): pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.672171 kernel: audit: type=1103 audit(1747097444.661:1365): pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.672209 kernel: audit: type=1006 audit(1747097444.661:1366): pid=4923 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 13 00:50:44.672230 kernel: audit: type=1300 audit(1747097444.661:1366): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe731f7a10 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:44.672328 kernel: audit: type=1327 audit(1747097444.661:1366): proctitle=737368643A20636F7265205B707269765D May 13 00:50:44.661000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.661000 audit[4923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe731f7a10 a2=3 a3=0 items=0 ppid=1 pid=4923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:44.661000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:50:44.668639 sshd[4923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:44.676926 systemd[1]: Started session-11.scope. May 13 00:50:44.677439 systemd-logind[1240]: New session 11 of user core. May 13 00:50:44.684000 audit[4923]: USER_START pid=4923 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.685000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.693764 kernel: audit: type=1105 audit(1747097444.684:1367): pid=4923 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.694425 kernel: audit: type=1103 audit(1747097444.685:1368): pid=4925 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.870194 sshd[4923]: pam_unix(sshd:session): session closed for user core May 13 00:50:44.870000 audit[4923]: USER_END pid=4923 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.874000 audit[4923]: CRED_DISP pid=4923 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.876276 systemd[1]: sshd@8-139.178.70.103:22-147.75.109.163:51070.service: Deactivated successfully. May 13 00:50:44.878238 kernel: audit: type=1106 audit(1747097444.870:1369): pid=4923 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.878270 kernel: audit: type=1104 audit(1747097444.874:1370): pid=4923 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:44.876760 systemd[1]: session-11.scope: Deactivated successfully. May 13 00:50:44.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.103:22-147.75.109.163:51070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:44.879392 systemd-logind[1240]: Session 11 logged out. Waiting for processes to exit. May 13 00:50:44.880055 systemd-logind[1240]: Removed session 11. May 13 00:50:45.942201 systemd[1]: run-containerd-runc-k8s.io-bc538d684d55e1c4e066dc381e9f9434f54520d0dc2229ce881fcded493c8c57-runc.knrl7p.mount: Deactivated successfully. May 13 00:50:49.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.103:22-147.75.109.163:44938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:49.882792 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:50:49.882821 kernel: audit: type=1130 audit(1747097449.873:1372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.103:22-147.75.109.163:44938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:49.874292 systemd[1]: Started sshd@9-139.178.70.103:22-147.75.109.163:44938.service. May 13 00:50:49.986000 audit[4958]: USER_ACCT pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:49.988386 sshd[4958]: Accepted publickey for core from 147.75.109.163 port 44938 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:50:49.992600 kernel: audit: type=1101 audit(1747097449.986:1373): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:49.991000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:49.993067 sshd[4958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:49.997960 kernel: audit: type=1103 audit(1747097449.991:1374): pid=4958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:49.998048 kernel: audit: type=1006 audit(1747097449.991:1375): pid=4958 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 13 00:50:49.991000 audit[4958]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe62f51b0 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:50.001457 kernel: audit: type=1300 audit(1747097449.991:1375): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe62f51b0 a2=3 a3=0 items=0 ppid=1 pid=4958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:50.005315 kernel: audit: type=1327 audit(1747097449.991:1375): proctitle=737368643A20636F7265205B707269765D May 13 00:50:50.012835 kernel: audit: type=1105 audit(1747097450.007:1376): pid=4958 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.012869 kernel: audit: type=1103 audit(1747097450.011:1377): pid=4960 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:49.991000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:50:50.007000 audit[4958]: USER_START pid=4958 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.011000 audit[4960]: CRED_ACQ pid=4960 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.003894 systemd-logind[1240]: New session 12 of user core. May 13 00:50:50.004832 systemd[1]: Started session-12.scope. May 13 00:50:50.196069 sshd[4958]: pam_unix(sshd:session): session closed for user core May 13 00:50:50.195000 audit[4958]: USER_END pid=4958 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.199636 systemd[1]: Started sshd@10-139.178.70.103:22-147.75.109.163:44948.service. May 13 00:50:50.205697 kernel: audit: type=1106 audit(1747097450.195:1378): pid=4958 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.205738 kernel: audit: type=1104 audit(1747097450.196:1379): pid=4958 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.196000 audit[4958]: CRED_DISP pid=4958 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.103:22-147.75.109.163:44948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:50.206850 systemd[1]: sshd@9-139.178.70.103:22-147.75.109.163:44938.service: Deactivated successfully. May 13 00:50:50.207386 systemd[1]: session-12.scope: Deactivated successfully. May 13 00:50:50.208420 systemd-logind[1240]: Session 12 logged out. Waiting for processes to exit. May 13 00:50:50.209178 systemd-logind[1240]: Removed session 12. May 13 00:50:50.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.103:22-147.75.109.163:44938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:50.230000 audit[4969]: USER_ACCT pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.232034 sshd[4969]: Accepted publickey for core from 147.75.109.163 port 44948 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:50:50.231000 audit[4969]: CRED_ACQ pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.231000 audit[4969]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3200eca0 a2=3 a3=0 items=0 ppid=1 pid=4969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:50.231000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:50:50.238000 audit[4969]: USER_START pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.239000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.236619 systemd[1]: Started session-13.scope. May 13 00:50:50.233386 sshd[4969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:50.237128 systemd-logind[1240]: New session 13 of user core. May 13 00:50:50.418049 systemd[1]: Started sshd@11-139.178.70.103:22-147.75.109.163:44952.service. May 13 00:50:50.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.103:22-147.75.109.163:44952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:50.428758 sshd[4969]: pam_unix(sshd:session): session closed for user core May 13 00:50:50.455000 audit[4969]: USER_END pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.456000 audit[4969]: CRED_DISP pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.103:22-147.75.109.163:44948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:50.458537 systemd[1]: sshd@10-139.178.70.103:22-147.75.109.163:44948.service: Deactivated successfully. May 13 00:50:50.459191 systemd[1]: session-13.scope: Deactivated successfully. May 13 00:50:50.459705 systemd-logind[1240]: Session 13 logged out. Waiting for processes to exit. May 13 00:50:50.460271 systemd-logind[1240]: Removed session 13. May 13 00:50:50.581000 audit[4979]: USER_ACCT pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.583711 sshd[4979]: Accepted publickey for core from 147.75.109.163 port 44952 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:50:50.582000 audit[4979]: CRED_ACQ pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.583000 audit[4979]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbd916dc0 a2=3 a3=0 items=0 ppid=1 pid=4979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:50.583000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:50:50.585229 sshd[4979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:50.589587 systemd[1]: Started session-14.scope. May 13 00:50:50.590207 systemd-logind[1240]: New session 14 of user core. May 13 00:50:50.592000 audit[4979]: USER_START pid=4979 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.593000 audit[4982]: CRED_ACQ pid=4982 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.835888 sshd[4979]: pam_unix(sshd:session): session closed for user core May 13 00:50:50.835000 audit[4979]: USER_END pid=4979 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.836000 audit[4979]: CRED_DISP pid=4979 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:50.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.103:22-147.75.109.163:44952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:50.839382 systemd[1]: sshd@11-139.178.70.103:22-147.75.109.163:44952.service: Deactivated successfully. May 13 00:50:50.840042 systemd[1]: session-14.scope: Deactivated successfully. May 13 00:50:50.840693 systemd-logind[1240]: Session 14 logged out. Waiting for processes to exit. May 13 00:50:50.841831 systemd-logind[1240]: Removed session 14. May 13 00:50:55.839271 systemd[1]: Started sshd@12-139.178.70.103:22-147.75.109.163:44968.service. May 13 00:50:55.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.103:22-147.75.109.163:44968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:55.858484 kernel: kauditd_printk_skb: 23 callbacks suppressed May 13 00:50:55.858578 kernel: audit: type=1130 audit(1747097455.838:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.103:22-147.75.109.163:44968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:57.123000 audit[4994]: USER_ACCT pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.135588 kernel: audit: type=1101 audit(1747097457.123:1400): pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.135630 kernel: audit: type=1103 audit(1747097457.129:1401): pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.135649 kernel: audit: type=1006 audit(1747097457.129:1402): pid=4994 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 13 00:50:57.135665 kernel: audit: type=1300 audit(1747097457.129:1402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe2206390 a2=3 a3=0 items=0 ppid=1 pid=4994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.129000 audit[4994]: CRED_ACQ pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.129000 audit[4994]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe2206390 a2=3 a3=0 items=0 ppid=1 pid=4994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:50:57.143643 kernel: audit: type=1327 audit(1747097457.129:1402): proctitle=737368643A20636F7265205B707269765D May 13 00:50:57.129000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:50:57.143707 sshd[4994]: Accepted publickey for core from 147.75.109.163 port 44968 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:50:57.130777 sshd[4994]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:50:57.142030 systemd[1]: Started session-15.scope. May 13 00:50:57.142373 systemd-logind[1240]: New session 15 of user core. May 13 00:50:57.144000 audit[4994]: USER_START pid=4994 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.145000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.152841 kernel: audit: type=1105 audit(1747097457.144:1403): pid=4994 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.152882 kernel: audit: type=1103 audit(1747097457.145:1404): pid=4996 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.294594 sshd[4994]: pam_unix(sshd:session): session closed for user core May 13 00:50:57.294000 audit[4994]: USER_END pid=4994 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.295000 audit[4994]: CRED_DISP pid=4994 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.299465 systemd-logind[1240]: Session 15 logged out. Waiting for processes to exit. May 13 00:50:57.307803 kernel: audit: type=1106 audit(1747097457.294:1405): pid=4994 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.307837 kernel: audit: type=1104 audit(1747097457.295:1406): pid=4994 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:50:57.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.103:22-147.75.109.163:44968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:50:57.300375 systemd[1]: sshd@12-139.178.70.103:22-147.75.109.163:44968.service: Deactivated successfully. May 13 00:50:57.300810 systemd[1]: session-15.scope: Deactivated successfully. May 13 00:50:57.301489 systemd-logind[1240]: Removed session 15. May 13 00:50:58.951231 systemd[1]: run-containerd-runc-k8s.io-962f0327c39484bddf104a356ef101e2f3f0f0c3056be0ef038f683f2cca3cc4-runc.GGSpJn.mount: Deactivated successfully. May 13 00:51:02.285058 systemd[1]: Started sshd@13-139.178.70.103:22-147.75.109.163:35422.service. May 13 00:51:02.327956 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:51:02.334045 kernel: audit: type=1130 audit(1747097462.284:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.103:22-147.75.109.163:35422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:02.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.103:22-147.75.109.163:35422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:03.166000 audit[5031]: USER_ACCT pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:03.170452 sshd[5031]: Accepted publickey for core from 147.75.109.163 port 35422 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:03.186403 kernel: audit: type=1101 audit(1747097463.166:1409): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:03.186498 kernel: audit: type=1103 audit(1747097463.171:1410): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:03.186549 kernel: audit: type=1006 audit(1747097463.171:1411): pid=5031 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 13 00:51:03.198830 kernel: audit: type=1300 audit(1747097463.171:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2b891440 a2=3 a3=0 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:03.198911 kernel: audit: type=1327 audit(1747097463.171:1411): proctitle=737368643A20636F7265205B707269765D May 13 00:51:03.171000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:03.171000 audit[5031]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2b891440 a2=3 a3=0 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:03.171000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:03.200205 sshd[5031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:03.225899 systemd[1]: Started session-16.scope. May 13 00:51:03.226403 systemd-logind[1240]: New session 16 of user core. May 13 00:51:03.229000 audit[5031]: USER_START pid=5031 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:03.235372 kernel: audit: type=1105 audit(1747097463.229:1412): pid=5031 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:03.236206 kernel: audit: type=1103 audit(1747097463.234:1413): pid=5033 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:03.234000 audit[5033]: CRED_ACQ pid=5033 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:04.097419 sshd[5031]: pam_unix(sshd:session): session closed for user core May 13 00:51:04.106000 audit[5031]: USER_END pid=5031 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:04.112363 kernel: audit: type=1106 audit(1747097464.106:1414): pid=5031 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:04.111000 audit[5031]: CRED_DISP pid=5031 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:04.116390 kernel: audit: type=1104 audit(1747097464.111:1415): pid=5031 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:04.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.103:22-147.75.109.163:35422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:04.125981 systemd[1]: sshd@13-139.178.70.103:22-147.75.109.163:35422.service: Deactivated successfully. May 13 00:51:04.126486 systemd[1]: session-16.scope: Deactivated successfully. May 13 00:51:04.127258 systemd-logind[1240]: Session 16 logged out. Waiting for processes to exit. May 13 00:51:04.127847 systemd-logind[1240]: Removed session 16. May 13 00:51:07.029000 audit[4297]: AVC avc: denied { watch } for pid=4297 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_49_49.803328619/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c765 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c344,c765 tclass=file permissive=0 May 13 00:51:07.029000 audit[4297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002658e80 a2=fc6 a3=0 items=0 ppid=3657 pid=4297 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c765 key=(null) May 13 00:51:07.029000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:51:07.469000 audit[4336]: AVC avc: denied { watch } for pid=4336 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_49_49.789828823/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c79,c754 tclass=file permissive=0 May 13 00:51:07.488133 kernel: kauditd_printk_skb: 4 callbacks suppressed May 13 00:51:07.500263 kernel: audit: type=1400 audit(1747097467.469:1418): avc: denied { watch } for pid=4336 comm="apiserver" path="/calico-apiserver-certs/..2025_05_13_00_49_49.789828823/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c79,c754 tclass=file permissive=0 May 13 00:51:07.500315 kernel: audit: type=1300 audit(1747097467.469:1418): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001494560 a2=fc6 a3=0 items=0 ppid=4100 pid=4336 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c754 key=(null) May 13 00:51:07.500340 kernel: audit: type=1327 audit(1747097467.469:1418): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:51:07.469000 audit[4336]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001494560 a2=fc6 a3=0 items=0 ppid=4100 pid=4336 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c754 key=(null) May 13 00:51:07.469000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 13 00:51:09.088892 systemd[1]: Started sshd@14-139.178.70.103:22-147.75.109.163:43046.service. May 13 00:51:09.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.103:22-147.75.109.163:43046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:09.101362 kernel: audit: type=1130 audit(1747097469.087:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.103:22-147.75.109.163:43046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:09.200615 sshd[5044]: Accepted publickey for core from 147.75.109.163 port 43046 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:09.199000 audit[5044]: USER_ACCT pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.214398 kernel: audit: type=1101 audit(1747097469.199:1420): pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.214447 kernel: audit: type=1103 audit(1747097469.203:1421): pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.214498 kernel: audit: type=1006 audit(1747097469.203:1422): pid=5044 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 13 00:51:09.225611 kernel: audit: type=1300 audit(1747097469.203:1422): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd54618550 a2=3 a3=0 items=0 ppid=1 pid=5044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:09.225650 kernel: audit: type=1327 audit(1747097469.203:1422): proctitle=737368643A20636F7265205B707269765D May 13 00:51:09.233611 kernel: audit: type=1105 audit(1747097469.220:1423): pid=5044 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.203000 audit[5044]: CRED_ACQ pid=5044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.203000 audit[5044]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd54618550 a2=3 a3=0 items=0 ppid=1 pid=5044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:09.203000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:09.220000 audit[5044]: USER_START pid=5044 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.224000 audit[5046]: CRED_ACQ pid=5046 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.204817 sshd[5044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:09.218360 systemd[1]: Started session-17.scope. May 13 00:51:09.218464 systemd-logind[1240]: New session 17 of user core. May 13 00:51:09.883284 sshd[5044]: pam_unix(sshd:session): session closed for user core May 13 00:51:09.882000 audit[5044]: USER_END pid=5044 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.882000 audit[5044]: CRED_DISP pid=5044 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:09.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.103:22-147.75.109.163:43046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:09.884900 systemd[1]: sshd@14-139.178.70.103:22-147.75.109.163:43046.service: Deactivated successfully. May 13 00:51:09.885431 systemd[1]: session-17.scope: Deactivated successfully. May 13 00:51:09.887589 systemd-logind[1240]: Session 17 logged out. Waiting for processes to exit. May 13 00:51:09.888123 systemd-logind[1240]: Removed session 17. May 13 00:51:14.893457 kernel: kauditd_printk_skb: 4 callbacks suppressed May 13 00:51:14.893568 kernel: audit: type=1130 audit(1747097474.887:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.103:22-147.75.109.163:43048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:14.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.103:22-147.75.109.163:43048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:14.888650 systemd[1]: Started sshd@15-139.178.70.103:22-147.75.109.163:43048.service. May 13 00:51:14.950692 sshd[5056]: Accepted publickey for core from 147.75.109.163 port 43048 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:14.949000 audit[5056]: USER_ACCT pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:14.951711 sshd[5056]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:14.950000 audit[5056]: CRED_ACQ pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:14.958385 kernel: audit: type=1101 audit(1747097474.949:1429): pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:14.958501 kernel: audit: type=1103 audit(1747097474.950:1430): pid=5056 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:14.960571 kernel: audit: type=1006 audit(1747097474.950:1431): pid=5056 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 13 00:51:14.960665 kernel: audit: type=1300 audit(1747097474.950:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd6d8cca0 a2=3 a3=0 items=0 ppid=1 pid=5056 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:14.967430 kernel: audit: type=1327 audit(1747097474.950:1431): proctitle=737368643A20636F7265205B707269765D May 13 00:51:14.950000 audit[5056]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd6d8cca0 a2=3 a3=0 items=0 ppid=1 pid=5056 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:14.950000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:14.970000 audit[5056]: USER_START pid=5056 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:14.966831 systemd[1]: Started session-18.scope. May 13 00:51:14.967539 systemd-logind[1240]: New session 18 of user core. May 13 00:51:14.980669 kernel: audit: type=1105 audit(1747097474.970:1432): pid=5056 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:14.980730 kernel: audit: type=1103 audit(1747097474.970:1433): pid=5058 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:14.970000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.142038 sshd[5056]: pam_unix(sshd:session): session closed for user core May 13 00:51:15.143000 audit[5056]: USER_END pid=5056 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.145758 systemd[1]: Started sshd@16-139.178.70.103:22-147.75.109.163:43062.service. May 13 00:51:15.149431 kernel: audit: type=1106 audit(1747097475.143:1434): pid=5056 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.154571 kernel: audit: type=1130 audit(1747097475.143:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.103:22-147.75.109.163:43062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:15.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.103:22-147.75.109.163:43062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:15.152174 systemd[1]: sshd@15-139.178.70.103:22-147.75.109.163:43048.service: Deactivated successfully. May 13 00:51:15.153017 systemd[1]: session-18.scope: Deactivated successfully. May 13 00:51:15.155155 systemd-logind[1240]: Session 18 logged out. Waiting for processes to exit. May 13 00:51:15.143000 audit[5056]: CRED_DISP pid=5056 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.103:22-147.75.109.163:43048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:15.157832 systemd-logind[1240]: Removed session 18. May 13 00:51:15.188000 audit[5066]: USER_ACCT pid=5066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.190095 sshd[5066]: Accepted publickey for core from 147.75.109.163 port 43062 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:15.189000 audit[5066]: CRED_ACQ pid=5066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.190000 audit[5066]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4b286e10 a2=3 a3=0 items=0 ppid=1 pid=5066 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:15.190000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:15.191608 sshd[5066]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:15.194109 systemd-logind[1240]: New session 19 of user core. May 13 00:51:15.194970 systemd[1]: Started session-19.scope. May 13 00:51:15.197000 audit[5066]: USER_START pid=5066 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.198000 audit[5069]: CRED_ACQ pid=5069 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.729000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:15.729000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:15.729000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014d93b0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:15.729000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:15.729000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ddca00 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:15.729000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:15.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.103:22-147.75.109.163:43072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:15.922669 systemd[1]: Started sshd@17-139.178.70.103:22-147.75.109.163:43072.service. May 13 00:51:15.926781 sshd[5066]: pam_unix(sshd:session): session closed for user core May 13 00:51:15.932000 audit[5066]: USER_END pid=5066 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.935000 audit[5066]: CRED_DISP pid=5066 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:15.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.103:22-147.75.109.163:43062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:15.938114 systemd[1]: sshd@16-139.178.70.103:22-147.75.109.163:43062.service: Deactivated successfully. May 13 00:51:15.938760 systemd[1]: session-19.scope: Deactivated successfully. May 13 00:51:15.939803 systemd-logind[1240]: Session 19 logged out. Waiting for processes to exit. May 13 00:51:15.940605 systemd-logind[1240]: Removed session 19. May 13 00:51:16.082000 audit[5075]: USER_ACCT pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:16.084883 sshd[5075]: Accepted publickey for core from 147.75.109.163 port 43072 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:16.084000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:16.084000 audit[5075]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a249150 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:16.084000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:16.086028 sshd[5075]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:16.089763 systemd-logind[1240]: New session 20 of user core. May 13 00:51:16.092000 audit[5075]: USER_START pid=5075 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:16.090122 systemd[1]: Started session-20.scope. May 13 00:51:16.126000 audit[5097]: CRED_ACQ pid=5097 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:16.575000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:16.575000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c128a50 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:51:16.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:51:16.575000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:16.575000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00e0da3f0 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:51:16.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:51:16.576000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:16.576000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c25a9c0 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:51:16.576000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:51:16.583000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:16.583000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c128b10 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:51:16.583000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:51:16.614000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:16.614000 audit[2042]: AVC avc: denied { watch } for pid=2042 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:16.614000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c452e00 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:51:16.614000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:51:16.614000 audit[2042]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00e0da510 a2=fc6 a3=0 items=0 ppid=1921 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c668 key=(null) May 13 00:51:16.614000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313033002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 13 00:51:18.294425 sshd[5075]: pam_unix(sshd:session): session closed for user core May 13 00:51:18.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.103:22-147.75.109.163:50608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:18.314000 audit[5075]: USER_END pid=5075 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:18.321000 audit[5075]: CRED_DISP pid=5075 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:18.297845 systemd[1]: Started sshd@18-139.178.70.103:22-147.75.109.163:50608.service. May 13 00:51:18.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.103:22-147.75.109.163:43072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:18.354966 systemd[1]: sshd@17-139.178.70.103:22-147.75.109.163:43072.service: Deactivated successfully. May 13 00:51:18.355667 systemd-logind[1240]: Session 20 logged out. Waiting for processes to exit. May 13 00:51:18.355716 systemd[1]: session-20.scope: Deactivated successfully. May 13 00:51:18.356772 systemd-logind[1240]: Removed session 20. May 13 00:51:18.424000 audit[5116]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:18.424000 audit[5116]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcfa418d50 a2=0 a3=7ffcfa418d3c items=0 ppid=2331 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:18.430000 audit[5112]: USER_ACCT pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:18.430000 audit[5112]: CRED_ACQ pid=5112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:18.430000 audit[5112]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb84b6380 a2=3 a3=0 items=0 ppid=1 pid=5112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.430000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:18.432000 audit[5116]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:18.432000 audit[5116]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcfa418d50 a2=0 a3=0 items=0 ppid=2331 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:18.444000 audit[5118]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:18.444000 audit[5118]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe43222620 a2=0 a3=7ffe4322260c items=0 ppid=2331 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:18.448000 audit[5118]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:18.448000 audit[5118]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe43222620 a2=0 a3=0 items=0 ppid=2331 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:18.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:18.456964 sshd[5112]: Accepted publickey for core from 147.75.109.163 port 50608 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:18.449280 sshd[5112]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:18.455487 systemd-logind[1240]: New session 21 of user core. May 13 00:51:18.455795 systemd[1]: Started session-21.scope. May 13 00:51:18.458000 audit[5112]: USER_START pid=5112 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:18.460000 audit[5119]: CRED_ACQ pid=5119 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.144471 sshd[5112]: pam_unix(sshd:session): session closed for user core May 13 00:51:19.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.103:22-147.75.109.163:50618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:19.146000 audit[5112]: USER_END pid=5112 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.146000 audit[5112]: CRED_DISP pid=5112 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.103:22-147.75.109.163:50608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:19.147051 systemd[1]: Started sshd@19-139.178.70.103:22-147.75.109.163:50618.service. May 13 00:51:19.152963 systemd-logind[1240]: Session 21 logged out. Waiting for processes to exit. May 13 00:51:19.153136 systemd[1]: sshd@18-139.178.70.103:22-147.75.109.163:50608.service: Deactivated successfully. May 13 00:51:19.153717 systemd[1]: session-21.scope: Deactivated successfully. May 13 00:51:19.154599 systemd-logind[1240]: Removed session 21. May 13 00:51:19.223000 audit[5131]: USER_ACCT pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.224000 audit[5131]: CRED_ACQ pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.224000 audit[5131]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc94939970 a2=3 a3=0 items=0 ppid=1 pid=5131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:19.224000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:19.226079 sshd[5131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:19.228200 sshd[5131]: Accepted publickey for core from 147.75.109.163 port 50618 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:19.229022 systemd-logind[1240]: New session 22 of user core. May 13 00:51:19.229572 systemd[1]: Started session-22.scope. May 13 00:51:19.231000 audit[5131]: USER_START pid=5131 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.232000 audit[5134]: CRED_ACQ pid=5134 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.358405 sshd[5131]: pam_unix(sshd:session): session closed for user core May 13 00:51:19.357000 audit[5131]: USER_END pid=5131 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.357000 audit[5131]: CRED_DISP pid=5131 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:19.360278 systemd[1]: sshd@19-139.178.70.103:22-147.75.109.163:50618.service: Deactivated successfully. May 13 00:51:19.360760 systemd[1]: session-22.scope: Deactivated successfully. May 13 00:51:19.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.103:22-147.75.109.163:50618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:19.361130 systemd-logind[1240]: Session 22 logged out. Waiting for processes to exit. May 13 00:51:19.361848 systemd-logind[1240]: Removed session 22. May 13 00:51:20.865000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:20.898949 kernel: kauditd_printk_skb: 81 callbacks suppressed May 13 00:51:20.907067 kernel: audit: type=1400 audit(1747097480.865:1485): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:20.907156 kernel: audit: type=1300 audit(1747097480.865:1485): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024429e0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:20.907177 kernel: audit: type=1327 audit(1747097480.865:1485): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:20.907192 kernel: audit: type=1400 audit(1747097480.872:1486): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:20.907209 kernel: audit: type=1300 audit(1747097480.872:1486): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002442a00 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:20.908211 kernel: audit: type=1327 audit(1747097480.872:1486): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:20.908234 kernel: audit: type=1400 audit(1747097480.887:1487): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:20.908283 kernel: audit: type=1300 audit(1747097480.887:1487): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025f00a0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:20.908298 kernel: audit: type=1327 audit(1747097480.887:1487): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:20.908362 kernel: audit: type=1400 audit(1747097480.899:1488): avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:20.865000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024429e0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:20.865000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:20.872000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:20.872000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002442a00 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:20.872000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:20.887000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:20.887000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025f00a0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:20.887000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:20.899000 audit[2087]: AVC avc: denied { watch } for pid=2087 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 13 00:51:20.899000 audit[2087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025f00c0 a2=fc6 a3=0 items=0 ppid=1950 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c571,c603 key=(null) May 13 00:51:20.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 13 00:51:23.191000 audit[5145]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5145 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:23.191000 audit[5145]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd189cf070 a2=0 a3=7ffd189cf05c items=0 ppid=2331 pid=5145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:23.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:23.198000 audit[5145]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=5145 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 00:51:23.198000 audit[5145]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd189cf070 a2=0 a3=7ffd189cf05c items=0 ppid=2331 pid=5145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:23.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 00:51:24.366715 systemd[1]: Started sshd@20-139.178.70.103:22-147.75.109.163:50634.service. May 13 00:51:24.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.103:22-147.75.109.163:50634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:24.483000 audit[5148]: USER_ACCT pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:24.494232 sshd[5148]: Accepted publickey for core from 147.75.109.163 port 50634 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:24.493000 audit[5148]: CRED_ACQ pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:24.493000 audit[5148]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff4948230 a2=3 a3=0 items=0 ppid=1 pid=5148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:24.493000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:24.503309 sshd[5148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:24.508720 systemd-logind[1240]: New session 23 of user core. May 13 00:51:24.509251 systemd[1]: Started session-23.scope. May 13 00:51:24.511000 audit[5148]: USER_START pid=5148 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:24.512000 audit[5150]: CRED_ACQ pid=5150 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:24.799486 sshd[5148]: pam_unix(sshd:session): session closed for user core May 13 00:51:24.800000 audit[5148]: USER_END pid=5148 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:24.801000 audit[5148]: CRED_DISP pid=5148 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:24.805865 systemd[1]: sshd@20-139.178.70.103:22-147.75.109.163:50634.service: Deactivated successfully. May 13 00:51:24.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.103:22-147.75.109.163:50634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:24.806444 systemd[1]: session-23.scope: Deactivated successfully. May 13 00:51:24.806908 systemd-logind[1240]: Session 23 logged out. Waiting for processes to exit. May 13 00:51:24.807546 systemd-logind[1240]: Removed session 23. May 13 00:51:29.817938 systemd[1]: Started sshd@21-139.178.70.103:22-147.75.109.163:51506.service. May 13 00:51:29.826162 kernel: kauditd_printk_skb: 19 callbacks suppressed May 13 00:51:29.836270 kernel: audit: type=1130 audit(1747097489.816:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.103:22-147.75.109.163:51506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:29.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.103:22-147.75.109.163:51506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:30.023000 audit[5187]: USER_ACCT pid=5187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.028707 kernel: audit: type=1101 audit(1747097490.023:1501): pid=5187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.028759 sshd[5187]: Accepted publickey for core from 147.75.109.163 port 51506 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:30.037687 kernel: audit: type=1103 audit(1747097490.027:1502): pid=5187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.038826 kernel: audit: type=1006 audit(1747097490.030:1503): pid=5187 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 13 00:51:30.039715 kernel: audit: type=1300 audit(1747097490.030:1503): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4f7850a0 a2=3 a3=0 items=0 ppid=1 pid=5187 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:30.039740 kernel: audit: type=1327 audit(1747097490.030:1503): proctitle=737368643A20636F7265205B707269765D May 13 00:51:30.027000 audit[5187]: CRED_ACQ pid=5187 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.030000 audit[5187]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4f7850a0 a2=3 a3=0 items=0 ppid=1 pid=5187 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:30.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:30.040307 sshd[5187]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:30.047824 systemd-logind[1240]: New session 24 of user core. May 13 00:51:30.048491 systemd[1]: Started session-24.scope. May 13 00:51:30.050000 audit[5187]: USER_START pid=5187 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.051000 audit[5189]: CRED_ACQ pid=5189 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.059070 kernel: audit: type=1105 audit(1747097490.050:1504): pid=5187 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.064487 kernel: audit: type=1103 audit(1747097490.051:1505): pid=5189 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.645315 sshd[5187]: pam_unix(sshd:session): session closed for user core May 13 00:51:30.646000 audit[5187]: USER_END pid=5187 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.646000 audit[5187]: CRED_DISP pid=5187 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.654664 kernel: audit: type=1106 audit(1747097490.646:1506): pid=5187 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.655095 kernel: audit: type=1104 audit(1747097490.646:1507): pid=5187 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:30.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.103:22-147.75.109.163:51506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:30.656312 systemd[1]: sshd@21-139.178.70.103:22-147.75.109.163:51506.service: Deactivated successfully. May 13 00:51:30.656898 systemd[1]: session-24.scope: Deactivated successfully. May 13 00:51:30.657396 systemd-logind[1240]: Session 24 logged out. Waiting for processes to exit. May 13 00:51:30.657996 systemd-logind[1240]: Removed session 24. May 13 00:51:35.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.103:22-147.75.109.163:51516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:35.653938 kernel: kauditd_printk_skb: 1 callbacks suppressed May 13 00:51:35.655177 kernel: audit: type=1130 audit(1747097495.650:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.103:22-147.75.109.163:51516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:35.651995 systemd[1]: Started sshd@22-139.178.70.103:22-147.75.109.163:51516.service. May 13 00:51:35.835000 audit[5208]: USER_ACCT pid=5208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:35.840374 kernel: audit: type=1101 audit(1747097495.835:1510): pid=5208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:35.840863 sshd[5208]: Accepted publickey for core from 147.75.109.163 port 51516 ssh2: RSA SHA256:vqcd0a/HrGkVrwMSh8NRsk9omLQxrQEaC7i/Qmd/lrA May 13 00:51:35.839000 audit[5208]: CRED_ACQ pid=5208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:35.846450 kernel: audit: type=1103 audit(1747097495.839:1511): pid=5208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:35.847407 kernel: audit: type=1006 audit(1747097495.839:1512): pid=5208 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 13 00:51:35.847432 kernel: audit: type=1300 audit(1747097495.839:1512): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef3409fe0 a2=3 a3=0 items=0 ppid=1 pid=5208 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:35.839000 audit[5208]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef3409fe0 a2=3 a3=0 items=0 ppid=1 pid=5208 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 00:51:35.856454 kernel: audit: type=1327 audit(1747097495.839:1512): proctitle=737368643A20636F7265205B707269765D May 13 00:51:35.839000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 00:51:35.853203 sshd[5208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 00:51:35.860000 systemd[1]: Started session-25.scope. May 13 00:51:35.860171 systemd-logind[1240]: New session 25 of user core. May 13 00:51:35.862000 audit[5208]: USER_START pid=5208 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:35.869349 kernel: audit: type=1105 audit(1747097495.862:1513): pid=5208 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:35.870093 kernel: audit: type=1103 audit(1747097495.867:1514): pid=5210 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:35.867000 audit[5210]: CRED_ACQ pid=5210 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:36.441349 sshd[5208]: pam_unix(sshd:session): session closed for user core May 13 00:51:36.441000 audit[5208]: USER_END pid=5208 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:36.446355 kernel: audit: type=1106 audit(1747097496.441:1515): pid=5208 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:36.445000 audit[5208]: CRED_DISP pid=5208 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:36.451300 kernel: audit: type=1104 audit(1747097496.445:1516): pid=5208 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 13 00:51:36.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.103:22-147.75.109.163:51516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 00:51:36.450370 systemd[1]: sshd@22-139.178.70.103:22-147.75.109.163:51516.service: Deactivated successfully. May 13 00:51:36.450837 systemd[1]: session-25.scope: Deactivated successfully. May 13 00:51:36.451874 systemd-logind[1240]: Session 25 logged out. Waiting for processes to exit. May 13 00:51:36.452967 systemd-logind[1240]: Removed session 25.