May 15 01:11:55.663132 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 14 23:14:51 -00 2025 May 15 01:11:55.663146 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 01:11:55.663152 kernel: Disabled fast string operations May 15 01:11:55.663156 kernel: BIOS-provided physical RAM map: May 15 01:11:55.663160 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable May 15 01:11:55.663164 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved May 15 01:11:55.663170 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved May 15 01:11:55.663174 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable May 15 01:11:55.663178 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data May 15 01:11:55.663182 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS May 15 01:11:55.663186 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable May 15 01:11:55.663190 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved May 15 01:11:55.663194 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved May 15 01:11:55.663198 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 15 01:11:55.663224 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved May 15 01:11:55.663231 kernel: NX (Execute Disable) protection: active May 15 01:11:55.663238 kernel: SMBIOS 2.7 present. May 15 01:11:55.663261 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 May 15 01:11:55.663269 kernel: vmware: hypercall mode: 0x00 May 15 01:11:55.663276 kernel: Hypervisor detected: VMware May 15 01:11:55.663286 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz May 15 01:11:55.663293 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz May 15 01:11:55.663300 kernel: vmware: using clock offset of 8162093265 ns May 15 01:11:55.663305 kernel: tsc: Detected 3408.000 MHz processor May 15 01:11:55.663310 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 01:11:55.663315 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 01:11:55.663319 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 May 15 01:11:55.663324 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 01:11:55.663328 kernel: total RAM covered: 3072M May 15 01:11:55.663334 kernel: Found optimal setting for mtrr clean up May 15 01:11:55.663340 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G May 15 01:11:55.663344 kernel: Using GB pages for direct mapping May 15 01:11:55.663348 kernel: ACPI: Early table checksum verification disabled May 15 01:11:55.663353 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) May 15 01:11:55.663357 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) May 15 01:11:55.663362 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) May 15 01:11:55.663366 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) May 15 01:11:55.663371 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 15 01:11:55.663375 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 15 01:11:55.663381 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) May 15 01:11:55.663387 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) May 15 01:11:55.663392 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) May 15 01:11:55.663397 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) May 15 01:11:55.663402 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) May 15 01:11:55.663407 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) May 15 01:11:55.663412 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] May 15 01:11:55.663417 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] May 15 01:11:55.663422 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 15 01:11:55.663427 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 15 01:11:55.663431 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] May 15 01:11:55.663436 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] May 15 01:11:55.663441 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] May 15 01:11:55.663446 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] May 15 01:11:55.663451 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] May 15 01:11:55.663456 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] May 15 01:11:55.663461 kernel: system APIC only can use physical flat May 15 01:11:55.663465 kernel: Setting APIC routing to physical flat. May 15 01:11:55.663470 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 15 01:11:55.663475 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 15 01:11:55.663480 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 15 01:11:55.663484 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 15 01:11:55.663489 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 15 01:11:55.663495 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 15 01:11:55.663500 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 15 01:11:55.663504 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 15 01:11:55.663509 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 May 15 01:11:55.663513 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 May 15 01:11:55.663518 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 May 15 01:11:55.663523 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 May 15 01:11:55.663527 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 May 15 01:11:55.663532 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 May 15 01:11:55.663537 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 May 15 01:11:55.663542 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 May 15 01:11:55.663547 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 May 15 01:11:55.663552 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 May 15 01:11:55.663556 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 May 15 01:11:55.663561 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 May 15 01:11:55.663566 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 May 15 01:11:55.663570 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 May 15 01:11:55.663575 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 May 15 01:11:55.663580 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 May 15 01:11:55.663584 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 May 15 01:11:55.663590 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 May 15 01:11:55.663594 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 May 15 01:11:55.663599 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 May 15 01:11:55.663604 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 May 15 01:11:55.663609 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 May 15 01:11:55.663613 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 May 15 01:11:55.663621 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 May 15 01:11:55.663626 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 May 15 01:11:55.663631 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 May 15 01:11:55.663636 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 May 15 01:11:55.663641 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 May 15 01:11:55.663646 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 May 15 01:11:55.663651 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 May 15 01:11:55.663655 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 May 15 01:11:55.663660 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 May 15 01:11:55.663665 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 May 15 01:11:55.663669 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 May 15 01:11:55.663674 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 May 15 01:11:55.663679 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 May 15 01:11:55.663684 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 May 15 01:11:55.663689 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 May 15 01:11:55.663694 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 May 15 01:11:55.663698 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 May 15 01:11:55.663703 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 May 15 01:11:55.663708 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 May 15 01:11:55.663712 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 May 15 01:11:55.663717 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 May 15 01:11:55.663722 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 May 15 01:11:55.663727 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 May 15 01:11:55.663732 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 May 15 01:11:55.663737 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 May 15 01:11:55.663742 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 May 15 01:11:55.663746 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 May 15 01:11:55.663751 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 May 15 01:11:55.663755 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 May 15 01:11:55.663760 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 May 15 01:11:55.663769 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 May 15 01:11:55.663775 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 May 15 01:11:55.663780 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 May 15 01:11:55.663785 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 May 15 01:11:55.663790 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 May 15 01:11:55.663796 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 May 15 01:11:55.663801 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 May 15 01:11:55.663806 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 May 15 01:11:55.663811 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 May 15 01:11:55.663816 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 May 15 01:11:55.663821 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 May 15 01:11:55.663826 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 May 15 01:11:55.663831 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 May 15 01:11:55.663836 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 May 15 01:11:55.663841 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 May 15 01:11:55.663846 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 May 15 01:11:55.663851 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 May 15 01:11:55.663856 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 May 15 01:11:55.663861 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 May 15 01:11:55.663874 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 May 15 01:11:55.663888 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 May 15 01:11:55.663895 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 May 15 01:11:55.663900 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 May 15 01:11:55.663905 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 May 15 01:11:55.663910 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 May 15 01:11:55.663915 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 May 15 01:11:55.663920 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 May 15 01:11:55.663925 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 May 15 01:11:55.663930 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 May 15 01:11:55.663935 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 May 15 01:11:55.663940 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 May 15 01:11:55.663946 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 May 15 01:11:55.663951 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 May 15 01:11:55.663956 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 May 15 01:11:55.663961 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 May 15 01:11:55.663966 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 May 15 01:11:55.663971 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 May 15 01:11:55.663976 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 May 15 01:11:55.663981 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 May 15 01:11:55.663986 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 May 15 01:11:55.663991 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 May 15 01:11:55.663997 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 May 15 01:11:55.664003 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 May 15 01:11:55.664008 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 May 15 01:11:55.664013 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 May 15 01:11:55.664018 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 May 15 01:11:55.664023 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 May 15 01:11:55.664028 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 May 15 01:11:55.664033 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 May 15 01:11:55.664038 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 May 15 01:11:55.664043 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 May 15 01:11:55.664049 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 May 15 01:11:55.664054 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 May 15 01:11:55.664059 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 May 15 01:11:55.664064 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 May 15 01:11:55.664069 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 May 15 01:11:55.664074 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 May 15 01:11:55.664079 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 May 15 01:11:55.664084 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 May 15 01:11:55.664089 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 May 15 01:11:55.664094 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 May 15 01:11:55.664100 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 May 15 01:11:55.664104 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 May 15 01:11:55.664110 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 May 15 01:11:55.664115 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 May 15 01:11:55.664120 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 May 15 01:11:55.664125 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 May 15 01:11:55.664130 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 15 01:11:55.664135 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 15 01:11:55.664140 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug May 15 01:11:55.664147 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] May 15 01:11:55.664152 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] May 15 01:11:55.664157 kernel: Zone ranges: May 15 01:11:55.664162 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 01:11:55.664167 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] May 15 01:11:55.664172 kernel: Normal empty May 15 01:11:55.664177 kernel: Movable zone start for each node May 15 01:11:55.664183 kernel: Early memory node ranges May 15 01:11:55.664188 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] May 15 01:11:55.664194 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] May 15 01:11:55.664199 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] May 15 01:11:55.664204 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] May 15 01:11:55.664210 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 01:11:55.664215 kernel: On node 0, zone DMA: 98 pages in unavailable ranges May 15 01:11:55.664220 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges May 15 01:11:55.664225 kernel: ACPI: PM-Timer IO Port: 0x1008 May 15 01:11:55.664230 kernel: system APIC only can use physical flat May 15 01:11:55.664235 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) May 15 01:11:55.664240 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 15 01:11:55.664247 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 15 01:11:55.664252 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 15 01:11:55.664257 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 15 01:11:55.664262 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 15 01:11:55.664267 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 15 01:11:55.664272 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 15 01:11:55.664277 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 15 01:11:55.664282 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 15 01:11:55.664287 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 15 01:11:55.664293 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 15 01:11:55.664298 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 15 01:11:55.664303 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 15 01:11:55.664308 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 15 01:11:55.664313 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 15 01:11:55.664318 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 15 01:11:55.664323 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) May 15 01:11:55.664328 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) May 15 01:11:55.664333 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) May 15 01:11:55.664338 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) May 15 01:11:55.664344 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) May 15 01:11:55.664349 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) May 15 01:11:55.664354 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) May 15 01:11:55.664360 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) May 15 01:11:55.664365 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) May 15 01:11:55.664370 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) May 15 01:11:55.664375 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) May 15 01:11:55.664380 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) May 15 01:11:55.664385 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) May 15 01:11:55.664391 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) May 15 01:11:55.664396 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) May 15 01:11:55.664401 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) May 15 01:11:55.664406 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) May 15 01:11:55.664411 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) May 15 01:11:55.664416 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) May 15 01:11:55.664421 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) May 15 01:11:55.664426 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) May 15 01:11:55.664431 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) May 15 01:11:55.664437 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) May 15 01:11:55.664442 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) May 15 01:11:55.664447 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) May 15 01:11:55.664452 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) May 15 01:11:55.664457 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) May 15 01:11:55.664462 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) May 15 01:11:55.664467 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) May 15 01:11:55.664472 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) May 15 01:11:55.664477 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) May 15 01:11:55.664483 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) May 15 01:11:55.664488 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) May 15 01:11:55.664493 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) May 15 01:11:55.664498 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) May 15 01:11:55.664504 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) May 15 01:11:55.664509 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) May 15 01:11:55.664514 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) May 15 01:11:55.664519 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) May 15 01:11:55.664524 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) May 15 01:11:55.664529 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) May 15 01:11:55.664535 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) May 15 01:11:55.664540 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) May 15 01:11:55.664545 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) May 15 01:11:55.664550 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) May 15 01:11:55.664555 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) May 15 01:11:55.664560 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) May 15 01:11:55.664565 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) May 15 01:11:55.664570 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) May 15 01:11:55.664575 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) May 15 01:11:55.664580 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) May 15 01:11:55.664586 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) May 15 01:11:55.664591 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) May 15 01:11:55.664596 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) May 15 01:11:55.664602 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) May 15 01:11:55.664607 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) May 15 01:11:55.664612 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) May 15 01:11:55.664617 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) May 15 01:11:55.664622 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) May 15 01:11:55.664627 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) May 15 01:11:55.664633 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) May 15 01:11:55.664638 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) May 15 01:11:55.664643 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) May 15 01:11:55.664648 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) May 15 01:11:55.664653 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) May 15 01:11:55.664658 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) May 15 01:11:55.664663 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) May 15 01:11:55.664687 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) May 15 01:11:55.664692 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) May 15 01:11:55.664698 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) May 15 01:11:55.664703 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) May 15 01:11:55.664709 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) May 15 01:11:55.664730 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) May 15 01:11:55.664735 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) May 15 01:11:55.664740 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) May 15 01:11:55.664745 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) May 15 01:11:55.664750 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) May 15 01:11:55.664755 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) May 15 01:11:55.664760 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) May 15 01:11:55.664766 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) May 15 01:11:55.664771 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) May 15 01:11:55.664776 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) May 15 01:11:55.664781 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) May 15 01:11:55.664786 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) May 15 01:11:55.664791 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) May 15 01:11:55.664797 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) May 15 01:11:55.664802 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) May 15 01:11:55.664807 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) May 15 01:11:55.664813 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) May 15 01:11:55.664818 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) May 15 01:11:55.664823 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) May 15 01:11:55.664828 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) May 15 01:11:55.664833 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) May 15 01:11:55.664838 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) May 15 01:11:55.664843 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) May 15 01:11:55.664848 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) May 15 01:11:55.664853 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) May 15 01:11:55.664858 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) May 15 01:11:55.664868 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) May 15 01:11:55.665086 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) May 15 01:11:55.665097 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) May 15 01:11:55.665103 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) May 15 01:11:55.665108 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) May 15 01:11:55.665113 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) May 15 01:11:55.665118 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) May 15 01:11:55.665123 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) May 15 01:11:55.665128 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) May 15 01:11:55.665135 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) May 15 01:11:55.665140 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) May 15 01:11:55.665145 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) May 15 01:11:55.665150 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) May 15 01:11:55.665155 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 May 15 01:11:55.665160 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) May 15 01:11:55.665166 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 01:11:55.665171 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 May 15 01:11:55.665176 kernel: TSC deadline timer available May 15 01:11:55.665182 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs May 15 01:11:55.665187 kernel: [mem 0x80000000-0xefffffff] available for PCI devices May 15 01:11:55.665192 kernel: Booting paravirtualized kernel on VMware hypervisor May 15 01:11:55.665198 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 01:11:55.665203 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 May 15 01:11:55.665208 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 15 01:11:55.665213 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 15 01:11:55.665218 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 May 15 01:11:55.665224 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 May 15 01:11:55.665229 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 May 15 01:11:55.665234 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 May 15 01:11:55.665239 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 May 15 01:11:55.665244 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 May 15 01:11:55.665249 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 May 15 01:11:55.665261 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 May 15 01:11:55.665268 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 May 15 01:11:55.665273 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 May 15 01:11:55.665278 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 May 15 01:11:55.665285 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 May 15 01:11:55.665290 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 May 15 01:11:55.665295 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 May 15 01:11:55.665301 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 May 15 01:11:55.665306 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 May 15 01:11:55.665311 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 May 15 01:11:55.665317 kernel: Policy zone: DMA32 May 15 01:11:55.665323 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 01:11:55.665330 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 01:11:55.665335 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes May 15 01:11:55.665341 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes May 15 01:11:55.665346 kernel: printk: log_buf_len min size: 262144 bytes May 15 01:11:55.665352 kernel: printk: log_buf_len: 1048576 bytes May 15 01:11:55.665358 kernel: printk: early log buf free: 239728(91%) May 15 01:11:55.665363 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 01:11:55.665369 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 15 01:11:55.665374 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 01:11:55.665381 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 155976K reserved, 0K cma-reserved) May 15 01:11:55.665387 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 May 15 01:11:55.665392 kernel: ftrace: allocating 34584 entries in 136 pages May 15 01:11:55.665398 kernel: ftrace: allocated 136 pages with 2 groups May 15 01:11:55.665404 kernel: rcu: Hierarchical RCU implementation. May 15 01:11:55.665411 kernel: rcu: RCU event tracing is enabled. May 15 01:11:55.665416 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. May 15 01:11:55.665422 kernel: Rude variant of Tasks RCU enabled. May 15 01:11:55.665427 kernel: Tracing variant of Tasks RCU enabled. May 15 01:11:55.665433 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 01:11:55.665439 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 May 15 01:11:55.665444 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 May 15 01:11:55.665449 kernel: random: crng init done May 15 01:11:55.665455 kernel: Console: colour VGA+ 80x25 May 15 01:11:55.665460 kernel: printk: console [tty0] enabled May 15 01:11:55.665466 kernel: printk: console [ttyS0] enabled May 15 01:11:55.665472 kernel: ACPI: Core revision 20210730 May 15 01:11:55.665478 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns May 15 01:11:55.665483 kernel: APIC: Switch to symmetric I/O mode setup May 15 01:11:55.665489 kernel: x2apic enabled May 15 01:11:55.665494 kernel: Switched APIC routing to physical x2apic. May 15 01:11:55.665500 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 01:11:55.665505 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 15 01:11:55.665511 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) May 15 01:11:55.665517 kernel: Disabled fast string operations May 15 01:11:55.665523 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 15 01:11:55.665529 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 15 01:11:55.665534 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 01:11:55.665540 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 15 01:11:55.665545 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 15 01:11:55.665551 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 15 01:11:55.665556 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 15 01:11:55.665563 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 15 01:11:55.665568 kernel: RETBleed: Mitigation: Enhanced IBRS May 15 01:11:55.665574 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 01:11:55.665579 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 01:11:55.665585 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 15 01:11:55.665590 kernel: SRBDS: Unknown: Dependent on hypervisor status May 15 01:11:55.665596 kernel: GDS: Unknown: Dependent on hypervisor status May 15 01:11:55.665601 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 01:11:55.665607 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 01:11:55.665613 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 01:11:55.665619 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 01:11:55.665643 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. May 15 01:11:55.665649 kernel: Freeing SMP alternatives memory: 32K May 15 01:11:55.665654 kernel: pid_max: default: 131072 minimum: 1024 May 15 01:11:55.665660 kernel: LSM: Security Framework initializing May 15 01:11:55.665666 kernel: SELinux: Initializing. May 15 01:11:55.665671 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 15 01:11:55.665677 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 15 01:11:55.665683 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 15 01:11:55.665689 kernel: Performance Events: Skylake events, core PMU driver. May 15 01:11:55.665695 kernel: core: CPUID marked event: 'cpu cycles' unavailable May 15 01:11:55.665700 kernel: core: CPUID marked event: 'instructions' unavailable May 15 01:11:55.665707 kernel: core: CPUID marked event: 'bus cycles' unavailable May 15 01:11:55.665712 kernel: core: CPUID marked event: 'cache references' unavailable May 15 01:11:55.665717 kernel: core: CPUID marked event: 'cache misses' unavailable May 15 01:11:55.665723 kernel: core: CPUID marked event: 'branch instructions' unavailable May 15 01:11:55.665728 kernel: core: CPUID marked event: 'branch misses' unavailable May 15 01:11:55.665735 kernel: ... version: 1 May 15 01:11:55.665741 kernel: ... bit width: 48 May 15 01:11:55.665746 kernel: ... generic registers: 4 May 15 01:11:55.665752 kernel: ... value mask: 0000ffffffffffff May 15 01:11:55.665757 kernel: ... max period: 000000007fffffff May 15 01:11:55.665763 kernel: ... fixed-purpose events: 0 May 15 01:11:55.665768 kernel: ... event mask: 000000000000000f May 15 01:11:55.665774 kernel: signal: max sigframe size: 1776 May 15 01:11:55.665779 kernel: rcu: Hierarchical SRCU implementation. May 15 01:11:55.665786 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 15 01:11:55.665791 kernel: smp: Bringing up secondary CPUs ... May 15 01:11:55.665797 kernel: x86: Booting SMP configuration: May 15 01:11:55.665802 kernel: .... node #0, CPUs: #1 May 15 01:11:55.665808 kernel: Disabled fast string operations May 15 01:11:55.665813 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 May 15 01:11:55.665819 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 15 01:11:55.665824 kernel: smp: Brought up 1 node, 2 CPUs May 15 01:11:55.665830 kernel: smpboot: Max logical packages: 128 May 15 01:11:55.665836 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) May 15 01:11:55.665842 kernel: devtmpfs: initialized May 15 01:11:55.665848 kernel: x86/mm: Memory block size: 128MB May 15 01:11:55.665853 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) May 15 01:11:55.665859 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 01:11:55.665873 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) May 15 01:11:55.665880 kernel: pinctrl core: initialized pinctrl subsystem May 15 01:11:55.665885 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 01:11:55.665891 kernel: audit: initializing netlink subsys (disabled) May 15 01:11:55.665896 kernel: audit: type=2000 audit(1747271514.066:1): state=initialized audit_enabled=0 res=1 May 15 01:11:55.665903 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 01:11:55.665909 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 01:11:55.665915 kernel: cpuidle: using governor menu May 15 01:11:55.665920 kernel: Simple Boot Flag at 0x36 set to 0x80 May 15 01:11:55.665926 kernel: ACPI: bus type PCI registered May 15 01:11:55.665931 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 01:11:55.665937 kernel: dca service started, version 1.12.1 May 15 01:11:55.665942 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) May 15 01:11:55.665948 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 May 15 01:11:55.665955 kernel: PCI: Using configuration type 1 for base access May 15 01:11:55.665960 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 01:11:55.665966 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 01:11:55.665972 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 01:11:55.665977 kernel: ACPI: Added _OSI(Module Device) May 15 01:11:55.665983 kernel: ACPI: Added _OSI(Processor Device) May 15 01:11:55.665988 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 01:11:55.665994 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 01:11:55.665999 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 01:11:55.666006 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 01:11:55.666012 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 01:11:55.666018 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 01:11:55.666023 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 15 01:11:55.666029 kernel: ACPI: Interpreter enabled May 15 01:11:55.666034 kernel: ACPI: PM: (supports S0 S1 S5) May 15 01:11:55.666040 kernel: ACPI: Using IOAPIC for interrupt routing May 15 01:11:55.666045 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 01:11:55.666051 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F May 15 01:11:55.666067 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) May 15 01:11:55.666141 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 01:11:55.666191 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] May 15 01:11:55.666238 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] May 15 01:11:55.666246 kernel: PCI host bridge to bus 0000:00 May 15 01:11:55.670982 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 01:11:55.671039 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] May 15 01:11:55.671085 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 01:11:55.671128 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 01:11:55.671169 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] May 15 01:11:55.671210 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] May 15 01:11:55.671266 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 May 15 01:11:55.671320 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 May 15 01:11:55.671373 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 May 15 01:11:55.671426 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a May 15 01:11:55.671473 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] May 15 01:11:55.671521 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 15 01:11:55.671567 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 15 01:11:55.671615 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 15 01:11:55.671663 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 15 01:11:55.671714 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 May 15 01:11:55.671762 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI May 15 01:11:55.671810 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB May 15 01:11:55.671860 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 May 15 01:11:55.671923 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] May 15 01:11:55.671975 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] May 15 01:11:55.672027 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 May 15 01:11:55.672075 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] May 15 01:11:55.672122 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] May 15 01:11:55.672169 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] May 15 01:11:55.672216 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] May 15 01:11:55.672281 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 01:11:55.672335 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 May 15 01:11:55.672386 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.672434 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold May 15 01:11:55.672488 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.672538 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold May 15 01:11:55.672589 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.672637 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold May 15 01:11:55.672690 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.672738 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold May 15 01:11:55.672788 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.672836 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold May 15 01:11:55.672899 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.672948 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold May 15 01:11:55.673001 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673048 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold May 15 01:11:55.673098 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673145 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold May 15 01:11:55.673195 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673242 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold May 15 01:11:55.673307 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673354 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold May 15 01:11:55.673405 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673452 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold May 15 01:11:55.673503 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673554 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold May 15 01:11:55.673604 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673656 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold May 15 01:11:55.673707 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673755 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold May 15 01:11:55.673805 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673855 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold May 15 01:11:55.673914 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.673963 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold May 15 01:11:55.674026 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674075 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold May 15 01:11:55.674126 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674173 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold May 15 01:11:55.674229 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674277 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold May 15 01:11:55.674328 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674375 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold May 15 01:11:55.674425 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674473 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold May 15 01:11:55.674526 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674582 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold May 15 01:11:55.674635 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674689 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold May 15 01:11:55.674759 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674807 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold May 15 01:11:55.674939 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.674991 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold May 15 01:11:55.675042 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.675089 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold May 15 01:11:55.675141 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.675188 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold May 15 01:11:55.675237 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.675286 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold May 15 01:11:55.675336 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.675382 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold May 15 01:11:55.675432 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.675478 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold May 15 01:11:55.675527 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.675577 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold May 15 01:11:55.675626 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 May 15 01:11:55.675673 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold May 15 01:11:55.675721 kernel: pci_bus 0000:01: extended config space not accessible May 15 01:11:55.675770 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 15 01:11:55.675818 kernel: pci_bus 0000:02: extended config space not accessible May 15 01:11:55.675828 kernel: acpiphp: Slot [32] registered May 15 01:11:55.675834 kernel: acpiphp: Slot [33] registered May 15 01:11:55.675840 kernel: acpiphp: Slot [34] registered May 15 01:11:55.675845 kernel: acpiphp: Slot [35] registered May 15 01:11:55.675851 kernel: acpiphp: Slot [36] registered May 15 01:11:55.675857 kernel: acpiphp: Slot [37] registered May 15 01:11:55.675862 kernel: acpiphp: Slot [38] registered May 15 01:11:55.675873 kernel: acpiphp: Slot [39] registered May 15 01:11:55.675879 kernel: acpiphp: Slot [40] registered May 15 01:11:55.675886 kernel: acpiphp: Slot [41] registered May 15 01:11:55.675892 kernel: acpiphp: Slot [42] registered May 15 01:11:55.675897 kernel: acpiphp: Slot [43] registered May 15 01:11:55.675903 kernel: acpiphp: Slot [44] registered May 15 01:11:55.675909 kernel: acpiphp: Slot [45] registered May 15 01:11:55.675915 kernel: acpiphp: Slot [46] registered May 15 01:11:55.675920 kernel: acpiphp: Slot [47] registered May 15 01:11:55.675926 kernel: acpiphp: Slot [48] registered May 15 01:11:55.675931 kernel: acpiphp: Slot [49] registered May 15 01:11:55.675937 kernel: acpiphp: Slot [50] registered May 15 01:11:55.675944 kernel: acpiphp: Slot [51] registered May 15 01:11:55.675950 kernel: acpiphp: Slot [52] registered May 15 01:11:55.675955 kernel: acpiphp: Slot [53] registered May 15 01:11:55.675961 kernel: acpiphp: Slot [54] registered May 15 01:11:55.675966 kernel: acpiphp: Slot [55] registered May 15 01:11:55.675972 kernel: acpiphp: Slot [56] registered May 15 01:11:55.675977 kernel: acpiphp: Slot [57] registered May 15 01:11:55.675983 kernel: acpiphp: Slot [58] registered May 15 01:11:55.675989 kernel: acpiphp: Slot [59] registered May 15 01:11:55.675995 kernel: acpiphp: Slot [60] registered May 15 01:11:55.676001 kernel: acpiphp: Slot [61] registered May 15 01:11:55.676006 kernel: acpiphp: Slot [62] registered May 15 01:11:55.676012 kernel: acpiphp: Slot [63] registered May 15 01:11:55.676061 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) May 15 01:11:55.676109 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 15 01:11:55.676154 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 15 01:11:55.676200 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 01:11:55.676245 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) May 15 01:11:55.676294 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) May 15 01:11:55.676339 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) May 15 01:11:55.676386 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) May 15 01:11:55.676431 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) May 15 01:11:55.676485 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 May 15 01:11:55.676534 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] May 15 01:11:55.676583 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] May 15 01:11:55.676637 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 15 01:11:55.676685 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold May 15 01:11:55.676733 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 15 01:11:55.676781 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 15 01:11:55.676828 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 15 01:11:55.676880 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 15 01:11:55.676928 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 15 01:11:55.676978 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 15 01:11:55.677025 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 15 01:11:55.677071 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 15 01:11:55.677119 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 15 01:11:55.677165 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 15 01:11:55.677211 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 15 01:11:55.677258 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 15 01:11:55.677319 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 15 01:11:55.677370 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 15 01:11:55.677418 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 15 01:11:55.677466 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 15 01:11:55.677512 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 15 01:11:55.677559 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 01:11:55.677608 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 15 01:11:55.677662 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 15 01:11:55.677719 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 15 01:11:55.677768 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 15 01:11:55.677814 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 15 01:11:55.677861 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 15 01:11:55.677935 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 15 01:11:55.677984 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 15 01:11:55.678031 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 15 01:11:55.678084 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 May 15 01:11:55.678133 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] May 15 01:11:55.678181 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] May 15 01:11:55.678240 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] May 15 01:11:55.678289 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] May 15 01:11:55.678340 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 15 01:11:55.678388 kernel: pci 0000:0b:00.0: supports D1 D2 May 15 01:11:55.678437 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 15 01:11:55.678485 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 15 01:11:55.678532 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 15 01:11:55.678580 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 15 01:11:55.678627 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 15 01:11:55.678673 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 15 01:11:55.678723 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 15 01:11:55.678769 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 15 01:11:55.678817 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 15 01:11:55.678869 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 15 01:11:55.678926 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 15 01:11:55.678972 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 15 01:11:55.679019 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 15 01:11:55.679066 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 15 01:11:55.679116 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 15 01:11:55.679163 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 01:11:55.679210 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 15 01:11:55.679256 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 15 01:11:55.679303 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 01:11:55.679350 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 15 01:11:55.679396 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 15 01:11:55.679442 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 15 01:11:55.679492 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 15 01:11:55.679539 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 15 01:11:55.679585 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 15 01:11:55.679646 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 15 01:11:55.679701 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 15 01:11:55.679748 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 01:11:55.679803 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 15 01:11:55.679850 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 15 01:11:55.679962 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 15 01:11:55.680013 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 01:11:55.680060 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 15 01:11:55.680354 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 15 01:11:55.680411 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 15 01:11:55.680459 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 15 01:11:55.680507 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 15 01:11:55.680557 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 15 01:11:55.680603 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 15 01:11:55.680655 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 15 01:11:55.680703 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 15 01:11:55.680749 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 15 01:11:55.680796 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 01:11:55.680842 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 15 01:11:55.683922 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 15 01:11:55.683984 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 01:11:55.684036 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 15 01:11:55.684085 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 15 01:11:55.684134 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 15 01:11:55.684181 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 15 01:11:55.684227 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 15 01:11:55.684274 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 15 01:11:55.684322 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 15 01:11:55.684371 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 15 01:11:55.684418 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 01:11:55.684464 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 15 01:11:55.684510 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 15 01:11:55.684555 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 15 01:11:55.684602 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 15 01:11:55.684649 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 15 01:11:55.684697 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 15 01:11:55.684745 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 15 01:11:55.684791 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 15 01:11:55.684839 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 15 01:11:55.684894 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 15 01:11:55.684943 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 15 01:11:55.684992 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 15 01:11:55.685039 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 15 01:11:55.685085 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 01:11:55.685135 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 15 01:11:55.685182 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 15 01:11:55.685228 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 15 01:11:55.685275 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 15 01:11:55.685321 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 15 01:11:55.685367 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 15 01:11:55.685414 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 15 01:11:55.685460 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 15 01:11:55.685509 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 15 01:11:55.685555 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 15 01:11:55.685601 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 15 01:11:55.685647 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 01:11:55.685655 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 May 15 01:11:55.685661 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 May 15 01:11:55.685667 kernel: ACPI: PCI: Interrupt link LNKB disabled May 15 01:11:55.685673 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 01:11:55.685680 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 May 15 01:11:55.685686 kernel: iommu: Default domain type: Translated May 15 01:11:55.685692 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 01:11:55.685737 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device May 15 01:11:55.685784 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 01:11:55.685830 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible May 15 01:11:55.685838 kernel: vgaarb: loaded May 15 01:11:55.685844 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 01:11:55.685850 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 01:11:55.685857 kernel: PTP clock support registered May 15 01:11:55.685863 kernel: PCI: Using ACPI for IRQ routing May 15 01:11:55.685874 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 01:11:55.685901 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] May 15 01:11:55.685909 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] May 15 01:11:55.685914 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 May 15 01:11:55.685920 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter May 15 01:11:55.685926 kernel: clocksource: Switched to clocksource tsc-early May 15 01:11:55.685932 kernel: VFS: Disk quotas dquot_6.6.0 May 15 01:11:55.685939 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 01:11:55.685945 kernel: pnp: PnP ACPI init May 15 01:11:55.685999 kernel: system 00:00: [io 0x1000-0x103f] has been reserved May 15 01:11:55.686043 kernel: system 00:00: [io 0x1040-0x104f] has been reserved May 15 01:11:55.686086 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved May 15 01:11:55.686131 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved May 15 01:11:55.686176 kernel: pnp 00:06: [dma 2] May 15 01:11:55.686224 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved May 15 01:11:55.686267 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved May 15 01:11:55.686309 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved May 15 01:11:55.686317 kernel: pnp: PnP ACPI: found 8 devices May 15 01:11:55.686323 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 01:11:55.686329 kernel: NET: Registered PF_INET protocol family May 15 01:11:55.686334 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 01:11:55.686342 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 15 01:11:55.686348 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 01:11:55.686353 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 15 01:11:55.686359 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 15 01:11:55.686365 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 15 01:11:55.686371 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 15 01:11:55.686376 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 15 01:11:55.686382 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 01:11:55.686388 kernel: NET: Registered PF_XDP protocol family May 15 01:11:55.686436 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 May 15 01:11:55.686485 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 15 01:11:55.686533 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 15 01:11:55.686580 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 15 01:11:55.686632 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 15 01:11:55.686679 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 May 15 01:11:55.686729 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 May 15 01:11:55.686776 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 May 15 01:11:55.686823 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 May 15 01:11:55.686934 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 May 15 01:11:55.686986 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 May 15 01:11:55.687032 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 May 15 01:11:55.687082 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 May 15 01:11:55.687129 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 May 15 01:11:55.687174 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 May 15 01:11:55.687221 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 May 15 01:11:55.687267 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 May 15 01:11:55.687312 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 May 15 01:11:55.687361 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 May 15 01:11:55.687408 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 May 15 01:11:55.687453 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 May 15 01:11:55.687499 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 May 15 01:11:55.687544 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 May 15 01:11:55.687590 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] May 15 01:11:55.687648 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] May 15 01:11:55.687696 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 15 01:11:55.687742 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.687788 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 15 01:11:55.687834 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.687895 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 15 01:11:55.687942 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.687994 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688040 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688086 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688133 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688178 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688224 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688270 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688316 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688365 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688410 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688456 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688501 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688546 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688592 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688638 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688684 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688730 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688778 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688825 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 15 01:11:55.688902 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.688957 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689005 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689050 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689097 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689142 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689191 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689237 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689284 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689330 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689376 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689421 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689468 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689514 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689563 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689609 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689655 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689701 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689746 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689792 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689838 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689899 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 15 01:11:55.689946 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.689994 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690041 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690087 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690134 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690179 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690226 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690272 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690318 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690363 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690412 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690457 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690504 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690550 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690596 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690646 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690693 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690738 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 15 01:11:55.690784 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.690830 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 15 01:11:55.691032 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.691085 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 15 01:11:55.691131 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.691178 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 15 01:11:55.691224 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.691270 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 15 01:11:55.691536 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.691589 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 15 01:11:55.691637 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.691691 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 15 01:11:55.691745 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.691792 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 15 01:11:55.691838 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.691891 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 15 01:11:55.691937 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.691983 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 15 01:11:55.692029 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 15 01:11:55.692076 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 15 01:11:55.692124 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] May 15 01:11:55.692170 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 15 01:11:55.692215 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 15 01:11:55.692261 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 01:11:55.692311 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] May 15 01:11:55.692357 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 15 01:11:55.692404 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 15 01:11:55.692449 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 15 01:11:55.692494 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] May 15 01:11:55.692543 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 15 01:11:55.692589 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 15 01:11:55.692634 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 15 01:11:55.692680 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 15 01:11:55.692727 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 15 01:11:55.692772 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 15 01:11:55.692818 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 15 01:11:55.692872 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 15 01:11:55.692926 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 15 01:11:55.692976 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 15 01:11:55.693022 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 15 01:11:55.693068 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 15 01:11:55.693114 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 15 01:11:55.693161 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 01:11:55.693209 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 15 01:11:55.693257 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 15 01:11:55.693302 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 15 01:11:55.693349 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 15 01:11:55.693395 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 15 01:11:55.693441 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 15 01:11:55.693487 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 15 01:11:55.693532 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 15 01:11:55.693579 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 15 01:11:55.693632 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] May 15 01:11:55.693682 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 15 01:11:55.693731 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 15 01:11:55.693777 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 15 01:11:55.693824 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] May 15 01:11:55.694114 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 15 01:11:55.694172 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 15 01:11:55.694223 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 15 01:11:55.694270 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 15 01:11:55.694318 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 15 01:11:55.694368 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 15 01:11:55.694415 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 15 01:11:55.694461 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 15 01:11:55.694507 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 15 01:11:55.694552 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 15 01:11:55.694599 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 01:11:55.694645 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 15 01:11:55.694691 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 15 01:11:55.694737 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 01:11:55.694782 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 15 01:11:55.694831 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 15 01:11:55.694893 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 15 01:11:55.694943 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 15 01:11:55.694989 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 15 01:11:55.695036 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 15 01:11:55.695082 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 15 01:11:55.695129 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 15 01:11:55.695175 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 01:11:55.695222 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 15 01:11:55.695270 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 15 01:11:55.695317 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 15 01:11:55.695363 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 01:11:55.695409 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 15 01:11:55.695455 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 15 01:11:55.695502 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 15 01:11:55.695548 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 15 01:11:55.695595 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 15 01:11:55.695641 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 15 01:11:55.695687 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 15 01:11:55.695735 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 15 01:11:55.695781 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 15 01:11:55.695828 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 15 01:11:55.695881 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 01:11:55.695928 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 15 01:11:55.695974 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 15 01:11:55.696021 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 01:11:55.696067 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 15 01:11:55.696113 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 15 01:11:55.696163 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 15 01:11:55.696208 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 15 01:11:55.696255 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 15 01:11:55.696300 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 15 01:11:55.696347 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 15 01:11:55.696393 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 15 01:11:55.696447 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 01:11:55.696528 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 15 01:11:55.696824 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 15 01:11:55.696921 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 15 01:11:55.696980 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 15 01:11:55.697036 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 15 01:11:55.697317 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 15 01:11:55.697376 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 15 01:11:55.697425 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 15 01:11:55.697473 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 15 01:11:55.697519 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 15 01:11:55.697566 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 15 01:11:55.697612 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 15 01:11:55.697666 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 15 01:11:55.697713 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 01:11:55.697759 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 15 01:11:55.697805 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 15 01:11:55.697851 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 15 01:11:55.697929 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 15 01:11:55.697975 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 15 01:11:55.698021 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 15 01:11:55.698066 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 15 01:11:55.698111 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 15 01:11:55.698160 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 15 01:11:55.698206 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 15 01:11:55.698251 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 15 01:11:55.698296 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 01:11:55.698339 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] May 15 01:11:55.698382 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] May 15 01:11:55.698593 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] May 15 01:11:55.698639 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] May 15 01:11:55.698684 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] May 15 01:11:55.698729 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] May 15 01:11:55.698773 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] May 15 01:11:55.698816 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 01:11:55.698859 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] May 15 01:11:55.699193 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] May 15 01:11:55.699244 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] May 15 01:11:55.699292 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] May 15 01:11:55.699336 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] May 15 01:11:55.699385 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] May 15 01:11:55.699430 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] May 15 01:11:55.699477 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] May 15 01:11:55.699525 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] May 15 01:11:55.699569 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] May 15 01:11:55.699825 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] May 15 01:11:55.699952 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] May 15 01:11:55.699999 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] May 15 01:11:55.700043 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] May 15 01:11:55.700092 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] May 15 01:11:55.700420 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] May 15 01:11:55.700474 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] May 15 01:11:55.700523 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 01:11:55.700571 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] May 15 01:11:55.700618 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] May 15 01:11:55.700667 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] May 15 01:11:55.700711 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] May 15 01:11:55.700759 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] May 15 01:11:55.700805 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] May 15 01:11:55.700852 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] May 15 01:11:55.700904 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] May 15 01:11:55.700947 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] May 15 01:11:55.700996 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] May 15 01:11:55.701039 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] May 15 01:11:55.701085 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] May 15 01:11:55.701138 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] May 15 01:11:55.702037 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] May 15 01:11:55.702084 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] May 15 01:11:55.702131 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] May 15 01:11:55.702176 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 01:11:55.702222 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] May 15 01:11:55.702268 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 01:11:55.702315 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] May 15 01:11:55.702358 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] May 15 01:11:55.702404 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] May 15 01:11:55.702451 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] May 15 01:11:55.702501 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] May 15 01:11:55.702547 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 01:11:55.702593 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] May 15 01:11:55.702637 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] May 15 01:11:55.702679 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 01:11:55.702726 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] May 15 01:11:55.702769 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] May 15 01:11:55.702816 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] May 15 01:11:55.702862 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] May 15 01:11:55.702925 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] May 15 01:11:55.702968 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] May 15 01:11:55.703015 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] May 15 01:11:55.703059 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 01:11:55.703105 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] May 15 01:11:55.703151 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 01:11:55.703198 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] May 15 01:11:55.703242 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] May 15 01:11:55.703292 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] May 15 01:11:55.703336 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] May 15 01:11:55.703382 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] May 15 01:11:55.703428 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 01:11:55.703475 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] May 15 01:11:55.707177 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] May 15 01:11:55.707228 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] May 15 01:11:55.707278 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] May 15 01:11:55.707324 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] May 15 01:11:55.707368 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] May 15 01:11:55.707420 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] May 15 01:11:55.707465 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] May 15 01:11:55.707515 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] May 15 01:11:55.707560 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 01:11:55.707608 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] May 15 01:11:55.707661 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] May 15 01:11:55.707709 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] May 15 01:11:55.707754 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] May 15 01:11:55.707802 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] May 15 01:11:55.707846 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] May 15 01:11:55.707964 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] May 15 01:11:55.708009 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 01:11:55.708064 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 15 01:11:55.708073 kernel: PCI: CLS 32 bytes, default 64 May 15 01:11:55.708080 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 15 01:11:55.708087 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 15 01:11:55.708093 kernel: clocksource: Switched to clocksource tsc May 15 01:11:55.708099 kernel: Initialise system trusted keyrings May 15 01:11:55.708106 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 15 01:11:55.708112 kernel: Key type asymmetric registered May 15 01:11:55.708119 kernel: Asymmetric key parser 'x509' registered May 15 01:11:55.708125 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 01:11:55.708132 kernel: io scheduler mq-deadline registered May 15 01:11:55.708138 kernel: io scheduler kyber registered May 15 01:11:55.708144 kernel: io scheduler bfq registered May 15 01:11:55.708365 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 May 15 01:11:55.708419 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.708472 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 May 15 01:11:55.708521 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.708572 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 May 15 01:11:55.708619 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.708668 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 May 15 01:11:55.708716 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.708764 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 May 15 01:11:55.708811 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.708860 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 May 15 01:11:55.708925 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.708976 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 May 15 01:11:55.709023 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.709071 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 May 15 01:11:55.709403 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.709457 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 May 15 01:11:55.709507 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.709555 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 May 15 01:11:55.709602 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.709650 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 May 15 01:11:55.709697 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.709747 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 May 15 01:11:55.709796 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.709845 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 May 15 01:11:55.709918 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.709967 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 May 15 01:11:55.710016 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.710063 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 May 15 01:11:55.710267 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.710318 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 May 15 01:11:55.710368 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.710420 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 May 15 01:11:55.710468 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.710516 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 May 15 01:11:55.710563 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.710610 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 May 15 01:11:55.710668 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.710716 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 May 15 01:11:55.710766 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.710815 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 May 15 01:11:55.710862 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.710924 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 May 15 01:11:55.710972 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.711019 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 May 15 01:11:55.711070 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.711128 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 May 15 01:11:55.711414 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.711475 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 May 15 01:11:55.711527 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.711576 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 May 15 01:11:55.711631 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.711680 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 May 15 01:11:55.711731 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.711792 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 May 15 01:11:55.711840 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.712168 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 May 15 01:11:55.712222 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.712276 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 May 15 01:11:55.712336 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.712396 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 May 15 01:11:55.712453 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.712511 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 May 15 01:11:55.712564 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 01:11:55.712574 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 01:11:55.712583 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 01:11:55.712589 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 01:11:55.712596 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 May 15 01:11:55.712602 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 01:11:55.712610 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 01:11:55.712962 kernel: rtc_cmos 00:01: registered as rtc0 May 15 01:11:55.713015 kernel: rtc_cmos 00:01: setting system clock to 2025-05-15T01:11:55 UTC (1747271515) May 15 01:11:55.713060 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram May 15 01:11:55.713069 kernel: intel_pstate: CPU model not supported May 15 01:11:55.713076 kernel: NET: Registered PF_INET6 protocol family May 15 01:11:55.713082 kernel: Segment Routing with IPv6 May 15 01:11:55.713088 kernel: In-situ OAM (IOAM) with IPv6 May 15 01:11:55.713101 kernel: NET: Registered PF_PACKET protocol family May 15 01:11:55.713108 kernel: Key type dns_resolver registered May 15 01:11:55.713114 kernel: IPI shorthand broadcast: enabled May 15 01:11:55.713120 kernel: sched_clock: Marking stable (851336777, 231442540)->(1147776509, -64997192) May 15 01:11:55.713127 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 01:11:55.713134 kernel: registered taskstats version 1 May 15 01:11:55.713142 kernel: Loading compiled-in X.509 certificates May 15 01:11:55.713148 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: a3400373b5c34ccb74f940604f224840f2b40bdd' May 15 01:11:55.713154 kernel: Key type .fscrypt registered May 15 01:11:55.713161 kernel: Key type fscrypt-provisioning registered May 15 01:11:55.713170 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 01:11:55.713176 kernel: ima: Allocated hash algorithm: sha1 May 15 01:11:55.713182 kernel: ima: No architecture policies found May 15 01:11:55.713188 kernel: clk: Disabling unused clocks May 15 01:11:55.713195 kernel: Freeing unused kernel image (initmem) memory: 47456K May 15 01:11:55.713202 kernel: Write protecting the kernel read-only data: 28672k May 15 01:11:55.713209 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 01:11:55.713218 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 01:11:55.713224 kernel: Run /init as init process May 15 01:11:55.713232 kernel: with arguments: May 15 01:11:55.713240 kernel: /init May 15 01:11:55.713246 kernel: with environment: May 15 01:11:55.713252 kernel: HOME=/ May 15 01:11:55.713258 kernel: TERM=linux May 15 01:11:55.713264 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 01:11:55.713274 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 01:11:55.713284 systemd[1]: Detected virtualization vmware. May 15 01:11:55.713290 systemd[1]: Detected architecture x86-64. May 15 01:11:55.713299 systemd[1]: Running in initrd. May 15 01:11:55.713308 systemd[1]: No hostname configured, using default hostname. May 15 01:11:55.713315 systemd[1]: Hostname set to . May 15 01:11:55.713321 systemd[1]: Initializing machine ID from random generator. May 15 01:11:55.713327 systemd[1]: Queued start job for default target initrd.target. May 15 01:11:55.713334 systemd[1]: Started systemd-ask-password-console.path. May 15 01:11:55.713343 systemd[1]: Reached target cryptsetup.target. May 15 01:11:55.713349 systemd[1]: Reached target paths.target. May 15 01:11:55.713357 systemd[1]: Reached target slices.target. May 15 01:11:55.713363 systemd[1]: Reached target swap.target. May 15 01:11:55.713369 systemd[1]: Reached target timers.target. May 15 01:11:55.713376 systemd[1]: Listening on iscsid.socket. May 15 01:11:55.713382 systemd[1]: Listening on iscsiuio.socket. May 15 01:11:55.713390 systemd[1]: Listening on systemd-journald-audit.socket. May 15 01:11:55.713396 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 01:11:55.713403 systemd[1]: Listening on systemd-journald.socket. May 15 01:11:55.713409 systemd[1]: Listening on systemd-networkd.socket. May 15 01:11:55.713415 systemd[1]: Listening on systemd-udevd-control.socket. May 15 01:11:55.713421 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 01:11:55.713427 systemd[1]: Reached target sockets.target. May 15 01:11:55.713434 systemd[1]: Starting kmod-static-nodes.service... May 15 01:11:55.713440 systemd[1]: Finished network-cleanup.service. May 15 01:11:55.713447 systemd[1]: Starting systemd-fsck-usr.service... May 15 01:11:55.713453 systemd[1]: Starting systemd-journald.service... May 15 01:11:55.713461 systemd[1]: Starting systemd-modules-load.service... May 15 01:11:55.713468 systemd[1]: Starting systemd-resolved.service... May 15 01:11:55.713484 systemd[1]: Starting systemd-vconsole-setup.service... May 15 01:11:55.713490 systemd[1]: Finished kmod-static-nodes.service. May 15 01:11:55.713499 systemd[1]: Finished systemd-fsck-usr.service. May 15 01:11:55.713508 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 01:11:55.713514 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 01:11:55.713525 kernel: audit: type=1130 audit(1747271515.664:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.713539 systemd[1]: Finished systemd-vconsole-setup.service. May 15 01:11:55.713548 kernel: audit: type=1130 audit(1747271515.669:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.713554 systemd[1]: Started systemd-resolved.service. May 15 01:11:55.713562 kernel: audit: type=1130 audit(1747271515.673:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.713570 systemd[1]: Reached target nss-lookup.target. May 15 01:11:55.713578 systemd[1]: Starting dracut-cmdline-ask.service... May 15 01:11:55.713585 systemd[1]: Finished dracut-cmdline-ask.service. May 15 01:11:55.713592 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 01:11:55.713600 systemd[1]: Starting dracut-cmdline.service... May 15 01:11:55.713610 kernel: audit: type=1130 audit(1747271515.701:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.713621 kernel: Bridge firewalling registered May 15 01:11:55.713634 systemd-journald[217]: Journal started May 15 01:11:55.713674 systemd-journald[217]: Runtime Journal (/run/log/journal/a0d671e4345a45a7936c1e9a3cc253a3) is 4.8M, max 38.8M, 34.0M free. May 15 01:11:55.717490 systemd[1]: Started systemd-journald.service. May 15 01:11:55.717506 kernel: audit: type=1130 audit(1747271515.712:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.668658 systemd-resolved[219]: Positive Trust Anchors: May 15 01:11:55.668663 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 01:11:55.668683 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 01:11:55.669937 systemd-modules-load[218]: Inserted module 'overlay' May 15 01:11:55.670472 systemd-resolved[219]: Defaulting to hostname 'linux'. May 15 01:11:55.712694 systemd-modules-load[218]: Inserted module 'br_netfilter' May 15 01:11:55.720663 dracut-cmdline[233]: dracut-dracut-053 May 15 01:11:55.720663 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 15 01:11:55.720663 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=bd2e5c4f6706621ae2eebb207adba6951c52e019661e3e87d19fb6c7284acf54 May 15 01:11:55.731891 kernel: SCSI subsystem initialized May 15 01:11:55.744369 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 01:11:55.744412 kernel: device-mapper: uevent: version 1.0.3 May 15 01:11:55.745625 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 01:11:55.748931 systemd-modules-load[218]: Inserted module 'dm_multipath' May 15 01:11:55.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.752874 kernel: audit: type=1130 audit(1747271515.747:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.749609 systemd[1]: Finished systemd-modules-load.service. May 15 01:11:55.753777 systemd[1]: Starting systemd-sysctl.service... May 15 01:11:55.758495 systemd[1]: Finished systemd-sysctl.service. May 15 01:11:55.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.762276 kernel: audit: type=1130 audit(1747271515.756:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.776885 kernel: Loading iSCSI transport class v2.0-870. May 15 01:11:55.789887 kernel: iscsi: registered transport (tcp) May 15 01:11:55.808888 kernel: iscsi: registered transport (qla4xxx) May 15 01:11:55.808930 kernel: QLogic iSCSI HBA Driver May 15 01:11:55.825581 systemd[1]: Finished dracut-cmdline.service. May 15 01:11:55.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.826227 systemd[1]: Starting dracut-pre-udev.service... May 15 01:11:55.829050 kernel: audit: type=1130 audit(1747271515.823:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:55.862880 kernel: raid6: avx2x4 gen() 48689 MB/s May 15 01:11:55.879878 kernel: raid6: avx2x4 xor() 22063 MB/s May 15 01:11:55.896878 kernel: raid6: avx2x2 gen() 53529 MB/s May 15 01:11:55.913882 kernel: raid6: avx2x2 xor() 31751 MB/s May 15 01:11:55.930888 kernel: raid6: avx2x1 gen() 44447 MB/s May 15 01:11:55.947880 kernel: raid6: avx2x1 xor() 27290 MB/s May 15 01:11:55.964876 kernel: raid6: sse2x4 gen() 21143 MB/s May 15 01:11:55.981877 kernel: raid6: sse2x4 xor() 11705 MB/s May 15 01:11:55.998905 kernel: raid6: sse2x2 gen() 21531 MB/s May 15 01:11:56.015876 kernel: raid6: sse2x2 xor() 13494 MB/s May 15 01:11:56.032877 kernel: raid6: sse2x1 gen() 18244 MB/s May 15 01:11:56.050063 kernel: raid6: sse2x1 xor() 8993 MB/s May 15 01:11:56.050079 kernel: raid6: using algorithm avx2x2 gen() 53529 MB/s May 15 01:11:56.050093 kernel: raid6: .... xor() 31751 MB/s, rmw enabled May 15 01:11:56.051212 kernel: raid6: using avx2x2 recovery algorithm May 15 01:11:56.059876 kernel: xor: automatically using best checksumming function avx May 15 01:11:56.118887 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 01:11:56.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:56.123119 systemd[1]: Finished dracut-pre-udev.service. May 15 01:11:56.125880 kernel: audit: type=1130 audit(1747271516.121:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:56.124000 audit: BPF prog-id=7 op=LOAD May 15 01:11:56.124000 audit: BPF prog-id=8 op=LOAD May 15 01:11:56.126240 systemd[1]: Starting systemd-udevd.service... May 15 01:11:56.135236 systemd-udevd[416]: Using default interface naming scheme 'v252'. May 15 01:11:56.138277 systemd[1]: Started systemd-udevd.service. May 15 01:11:56.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:56.142045 systemd[1]: Starting dracut-pre-trigger.service... May 15 01:11:56.149241 dracut-pre-trigger[432]: rd.md=0: removing MD RAID activation May 15 01:11:56.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:56.166601 systemd[1]: Finished dracut-pre-trigger.service. May 15 01:11:56.167157 systemd[1]: Starting systemd-udev-trigger.service... May 15 01:11:56.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:56.229094 systemd[1]: Finished systemd-udev-trigger.service. May 15 01:11:56.286877 kernel: VMware PVSCSI driver - version 1.0.7.0-k May 15 01:11:56.295812 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI May 15 01:11:56.295837 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 May 15 01:11:56.315680 kernel: vmw_pvscsi: using 64bit dma May 15 01:11:56.315692 kernel: vmw_pvscsi: max_id: 16 May 15 01:11:56.315699 kernel: vmw_pvscsi: setting ring_pages to 8 May 15 01:11:56.315710 kernel: vmw_pvscsi: enabling reqCallThreshold May 15 01:11:56.315717 kernel: vmw_pvscsi: driver-based request coalescing enabled May 15 01:11:56.315724 kernel: vmw_pvscsi: using MSI-X May 15 01:11:56.315731 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 May 15 01:11:56.315800 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps May 15 01:11:56.315860 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 May 15 01:11:56.315955 kernel: cryptd: max_cpu_qlen set to 1000 May 15 01:11:56.317502 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 May 15 01:11:56.324880 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 May 15 01:11:56.328071 kernel: AVX2 version of gcm_enc/dec engaged. May 15 01:11:56.328091 kernel: AES CTR mode by8 optimization enabled May 15 01:11:56.330859 kernel: libata version 3.00 loaded. May 15 01:11:56.334882 kernel: ata_piix 0000:00:07.1: version 2.13 May 15 01:11:56.342487 kernel: scsi host1: ata_piix May 15 01:11:56.342563 kernel: scsi host2: ata_piix May 15 01:11:56.342633 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 May 15 01:11:56.342646 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 May 15 01:11:56.345363 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) May 15 01:11:56.522623 kernel: sd 0:0:0:0: [sda] Write Protect is off May 15 01:11:56.522699 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 May 15 01:11:56.522762 kernel: sd 0:0:0:0: [sda] Cache data unavailable May 15 01:11:56.522820 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through May 15 01:11:56.522887 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 May 15 01:11:56.522898 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 May 15 01:11:56.522977 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 01:11:56.522985 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 15 01:11:56.551445 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray May 15 01:11:56.568849 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 01:11:56.568863 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 01:11:56.642222 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 01:11:56.643879 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (472) May 15 01:11:56.647700 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 01:11:56.648771 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 01:11:56.651359 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 01:11:56.653830 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 01:11:56.654677 systemd[1]: Starting disk-uuid.service... May 15 01:11:56.729895 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 01:11:56.766926 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 01:11:56.896452 (udev-worker)[463]: sda2: Failed to create/update device symlink '/dev/disk/by-partuuid/f518fe03-7a47-4ff4-904f-dc981e18c84d', ignoring: No such file or directory May 15 01:11:57.846904 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 01:11:57.847245 disk-uuid[551]: The operation has completed successfully. May 15 01:11:57.906703 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 01:11:57.907011 systemd[1]: Finished disk-uuid.service. May 15 01:11:57.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:57.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:57.907855 systemd[1]: Starting verity-setup.service... May 15 01:11:57.919884 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 15 01:11:58.144762 systemd[1]: Found device dev-mapper-usr.device. May 15 01:11:58.145943 systemd[1]: Mounting sysusr-usr.mount... May 15 01:11:58.147516 systemd[1]: Finished verity-setup.service. May 15 01:11:58.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.219688 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 01:11:58.218579 systemd[1]: Mounted sysusr-usr.mount. May 15 01:11:58.219141 systemd[1]: Starting afterburn-network-kargs.service... May 15 01:11:58.219571 systemd[1]: Starting ignition-setup.service... May 15 01:11:58.315460 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 15 01:11:58.315495 kernel: BTRFS info (device sda6): using free space tree May 15 01:11:58.315503 kernel: BTRFS info (device sda6): has skinny extents May 15 01:11:58.321890 kernel: BTRFS info (device sda6): enabling ssd optimizations May 15 01:11:58.327408 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 01:11:58.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.333664 systemd[1]: Finished ignition-setup.service. May 15 01:11:58.334306 systemd[1]: Starting ignition-fetch-offline.service... May 15 01:11:58.449800 systemd[1]: Finished afterburn-network-kargs.service. May 15 01:11:58.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.450569 systemd[1]: Starting parse-ip-for-networkd.service... May 15 01:11:58.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.495000 audit: BPF prog-id=9 op=LOAD May 15 01:11:58.497139 systemd[1]: Finished parse-ip-for-networkd.service. May 15 01:11:58.497969 systemd[1]: Starting systemd-networkd.service... May 15 01:11:58.511335 systemd-networkd[736]: lo: Link UP May 15 01:11:58.511341 systemd-networkd[736]: lo: Gained carrier May 15 01:11:58.511604 systemd-networkd[736]: Enumeration completed May 15 01:11:58.511809 systemd-networkd[736]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. May 15 01:11:58.513817 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 15 01:11:58.513923 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 15 01:11:58.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.512021 systemd[1]: Started systemd-networkd.service. May 15 01:11:58.512162 systemd[1]: Reached target network.target. May 15 01:11:58.512635 systemd[1]: Starting iscsiuio.service... May 15 01:11:58.514992 systemd-networkd[736]: ens192: Link UP May 15 01:11:58.514994 systemd-networkd[736]: ens192: Gained carrier May 15 01:11:58.518729 systemd[1]: Started iscsiuio.service. May 15 01:11:58.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.519334 systemd[1]: Starting iscsid.service... May 15 01:11:58.521753 iscsid[741]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 01:11:58.521753 iscsid[741]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 01:11:58.521753 iscsid[741]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 01:11:58.521753 iscsid[741]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 01:11:58.521753 iscsid[741]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 01:11:58.521753 iscsid[741]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 01:11:58.522562 systemd[1]: Started iscsid.service. May 15 01:11:58.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.523216 systemd[1]: Starting dracut-initqueue.service... May 15 01:11:58.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.532852 systemd[1]: Finished dracut-initqueue.service. May 15 01:11:58.533215 systemd[1]: Reached target remote-fs-pre.target. May 15 01:11:58.533621 systemd[1]: Reached target remote-cryptsetup.target. May 15 01:11:58.533839 systemd[1]: Reached target remote-fs.target. May 15 01:11:58.535242 systemd[1]: Starting dracut-pre-mount.service... May 15 01:11:58.541270 systemd[1]: Finished dracut-pre-mount.service. May 15 01:11:58.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.713904 ignition[607]: Ignition 2.14.0 May 15 01:11:58.713918 ignition[607]: Stage: fetch-offline May 15 01:11:58.713963 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 01:11:58.713982 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 01:11:58.717811 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 01:11:58.717924 ignition[607]: parsed url from cmdline: "" May 15 01:11:58.717927 ignition[607]: no config URL provided May 15 01:11:58.717931 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" May 15 01:11:58.717938 ignition[607]: no config at "/usr/lib/ignition/user.ign" May 15 01:11:58.718393 ignition[607]: config successfully fetched May 15 01:11:58.718414 ignition[607]: parsing config with SHA512: 461a846f029088aa52d0ed40c2d23d723e52d95a976a5128a6c78d15b3c347467b6e277505cd129ec38a30948834f24edbaa69f54fe569e378e5d7b5a817d2af May 15 01:11:58.730266 unknown[607]: fetched base config from "system" May 15 01:11:58.730282 unknown[607]: fetched user config from "vmware" May 15 01:11:58.730783 ignition[607]: fetch-offline: fetch-offline passed May 15 01:11:58.730849 ignition[607]: Ignition finished successfully May 15 01:11:58.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.731784 systemd[1]: Finished ignition-fetch-offline.service. May 15 01:11:58.732011 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 01:11:58.732669 systemd[1]: Starting ignition-kargs.service... May 15 01:11:58.741126 ignition[755]: Ignition 2.14.0 May 15 01:11:58.741139 ignition[755]: Stage: kargs May 15 01:11:58.741243 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 01:11:58.741262 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 01:11:58.743394 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 01:11:58.745599 ignition[755]: kargs: kargs passed May 15 01:11:58.745643 ignition[755]: Ignition finished successfully May 15 01:11:58.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.747157 systemd[1]: Finished ignition-kargs.service. May 15 01:11:58.747888 systemd[1]: Starting ignition-disks.service... May 15 01:11:58.753281 ignition[761]: Ignition 2.14.0 May 15 01:11:58.753288 ignition[761]: Stage: disks May 15 01:11:58.753351 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 01:11:58.753361 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 01:11:58.754993 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 01:11:58.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.757140 ignition[761]: disks: disks passed May 15 01:11:58.757736 systemd[1]: Finished ignition-disks.service. May 15 01:11:58.757177 ignition[761]: Ignition finished successfully May 15 01:11:58.757934 systemd[1]: Reached target initrd-root-device.target. May 15 01:11:58.758048 systemd[1]: Reached target local-fs-pre.target. May 15 01:11:58.758146 systemd[1]: Reached target local-fs.target. May 15 01:11:58.758231 systemd[1]: Reached target sysinit.target. May 15 01:11:58.758313 systemd[1]: Reached target basic.target. May 15 01:11:58.759022 systemd[1]: Starting systemd-fsck-root.service... May 15 01:11:58.770942 systemd-fsck[769]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 15 01:11:58.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.772679 systemd[1]: Finished systemd-fsck-root.service. May 15 01:11:58.773373 systemd[1]: Mounting sysroot.mount... May 15 01:11:58.812881 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 01:11:58.813011 systemd[1]: Mounted sysroot.mount. May 15 01:11:58.813181 systemd[1]: Reached target initrd-root-fs.target. May 15 01:11:58.825382 systemd[1]: Mounting sysroot-usr.mount... May 15 01:11:58.825772 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 01:11:58.825803 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 01:11:58.825820 systemd[1]: Reached target ignition-diskful.target. May 15 01:11:58.828048 systemd[1]: Mounted sysroot-usr.mount. May 15 01:11:58.828545 systemd[1]: Starting initrd-setup-root.service... May 15 01:11:58.837044 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory May 15 01:11:58.859446 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory May 15 01:11:58.866666 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory May 15 01:11:58.873242 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory May 15 01:11:58.943238 systemd[1]: Finished initrd-setup-root.service. May 15 01:11:58.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.943879 systemd[1]: Starting ignition-mount.service... May 15 01:11:58.944438 systemd[1]: Starting sysroot-boot.service... May 15 01:11:58.948870 bash[820]: umount: /sysroot/usr/share/oem: not mounted. May 15 01:11:58.954441 ignition[821]: INFO : Ignition 2.14.0 May 15 01:11:58.954691 ignition[821]: INFO : Stage: mount May 15 01:11:58.954872 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 01:11:58.955049 ignition[821]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 01:11:58.956634 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 01:11:58.958152 ignition[821]: INFO : mount: mount passed May 15 01:11:58.958310 ignition[821]: INFO : Ignition finished successfully May 15 01:11:58.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.958910 systemd[1]: Finished ignition-mount.service. May 15 01:11:58.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:11:58.966439 systemd[1]: Finished sysroot-boot.service. May 15 01:11:59.171826 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 01:11:59.231893 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (830) May 15 01:11:59.245982 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 15 01:11:59.246014 kernel: BTRFS info (device sda6): using free space tree May 15 01:11:59.246026 kernel: BTRFS info (device sda6): has skinny extents May 15 01:11:59.288890 kernel: BTRFS info (device sda6): enabling ssd optimizations May 15 01:11:59.297078 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 01:11:59.297802 systemd[1]: Starting ignition-files.service... May 15 01:11:59.309542 ignition[850]: INFO : Ignition 2.14.0 May 15 01:11:59.309542 ignition[850]: INFO : Stage: files May 15 01:11:59.309945 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 01:11:59.309945 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 01:11:59.311240 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 01:11:59.313533 ignition[850]: DEBUG : files: compiled without relabeling support, skipping May 15 01:11:59.314123 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 01:11:59.314123 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 01:11:59.316414 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 01:11:59.316656 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 01:11:59.317480 unknown[850]: wrote ssh authorized keys file for user: core May 15 01:11:59.318152 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 01:11:59.318692 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 01:11:59.318692 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 01:11:59.371012 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 01:11:59.462561 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 01:11:59.462899 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 01:11:59.463279 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 01:11:59.463509 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 01:11:59.463828 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 01:11:59.464070 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 01:11:59.464398 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 01:11:59.464629 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 01:11:59.465615 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 01:11:59.466096 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 01:11:59.466473 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 01:11:59.466710 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 01:11:59.467062 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 01:11:59.467481 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 15 01:11:59.467725 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 15 01:11:59.471212 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4153131361" May 15 01:11:59.471434 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4153131361": device or resource busy May 15 01:11:59.471434 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4153131361", trying btrfs: device or resource busy May 15 01:11:59.471434 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4153131361" May 15 01:11:59.471434 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4153131361" May 15 01:11:59.473662 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem4153131361" May 15 01:11:59.474529 systemd[1]: mnt-oem4153131361.mount: Deactivated successfully. May 15 01:11:59.474883 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem4153131361" May 15 01:11:59.475060 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 15 01:11:59.475060 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 01:11:59.475060 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 15 01:11:59.584067 systemd-networkd[736]: ens192: Gained IPv6LL May 15 01:11:59.918645 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 15 01:12:00.101545 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 01:12:00.102131 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 15 01:12:00.102441 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 15 01:12:00.102690 ignition[850]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" May 15 01:12:00.102853 ignition[850]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" May 15 01:12:00.103047 ignition[850]: INFO : files: op(11): [started] processing unit "prepare-helm.service" May 15 01:12:00.103262 ignition[850]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 01:12:00.103714 ignition[850]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 01:12:00.103951 ignition[850]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" May 15 01:12:00.104118 ignition[850]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" May 15 01:12:00.104306 ignition[850]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 01:12:00.104589 ignition[850]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 01:12:00.104818 ignition[850]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" May 15 01:12:00.104997 ignition[850]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" May 15 01:12:00.105250 ignition[850]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" May 15 01:12:00.105418 ignition[850]: INFO : files: op(16): [started] setting preset to disabled for "coreos-metadata.service" May 15 01:12:00.105603 ignition[850]: INFO : files: op(16): op(17): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 01:12:00.292618 ignition[850]: INFO : files: op(16): op(17): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 01:12:00.292969 ignition[850]: INFO : files: op(16): [finished] setting preset to disabled for "coreos-metadata.service" May 15 01:12:00.293202 ignition[850]: INFO : files: op(18): [started] setting preset to enabled for "vmtoolsd.service" May 15 01:12:00.293440 ignition[850]: INFO : files: op(18): [finished] setting preset to enabled for "vmtoolsd.service" May 15 01:12:00.293983 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 01:12:00.294587 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 01:12:00.294912 ignition[850]: INFO : files: files passed May 15 01:12:00.295069 ignition[850]: INFO : Ignition finished successfully May 15 01:12:00.296372 systemd[1]: Finished ignition-files.service. May 15 01:12:00.299738 kernel: kauditd_printk_skb: 24 callbacks suppressed May 15 01:12:00.299767 kernel: audit: type=1130 audit(1747271520.294:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.297574 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 01:12:00.301234 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 01:12:00.301853 systemd[1]: Starting ignition-quench.service... May 15 01:12:00.304764 initrd-setup-root-after-ignition[875]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 01:12:00.305209 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 01:12:00.305426 systemd[1]: Reached target ignition-complete.target. May 15 01:12:00.306120 systemd[1]: Starting initrd-parse-etc.service... May 15 01:12:00.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.310882 kernel: audit: type=1130 audit(1747271520.303:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.311211 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 01:12:00.311295 systemd[1]: Finished ignition-quench.service. May 15 01:12:00.314885 kernel: audit: type=1130 audit(1747271520.309:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.318879 kernel: audit: type=1131 audit(1747271520.309:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.320651 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 01:12:00.320737 systemd[1]: Finished initrd-parse-etc.service. May 15 01:12:00.320989 systemd[1]: Reached target initrd-fs.target. May 15 01:12:00.326133 kernel: audit: type=1130 audit(1747271520.319:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.326147 kernel: audit: type=1131 audit(1747271520.319:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.326049 systemd[1]: Reached target initrd.target. May 15 01:12:00.326218 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 01:12:00.326697 systemd[1]: Starting dracut-pre-pivot.service... May 15 01:12:00.333256 systemd[1]: Finished dracut-pre-pivot.service. May 15 01:12:00.333884 systemd[1]: Starting initrd-cleanup.service... May 15 01:12:00.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.337881 kernel: audit: type=1130 audit(1747271520.331:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.340922 systemd[1]: Stopped target nss-lookup.target. May 15 01:12:00.341095 systemd[1]: Stopped target remote-cryptsetup.target. May 15 01:12:00.341271 systemd[1]: Stopped target timers.target. May 15 01:12:00.341425 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 01:12:00.341495 systemd[1]: Stopped dracut-pre-pivot.service. May 15 01:12:00.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.341780 systemd[1]: Stopped target initrd.target. May 15 01:12:00.344405 systemd[1]: Stopped target basic.target. May 15 01:12:00.344556 systemd[1]: Stopped target ignition-complete.target. May 15 01:12:00.344735 systemd[1]: Stopped target ignition-diskful.target. May 15 01:12:00.344994 kernel: audit: type=1131 audit(1747271520.339:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.344936 systemd[1]: Stopped target initrd-root-device.target. May 15 01:12:00.345108 systemd[1]: Stopped target remote-fs.target. May 15 01:12:00.345282 systemd[1]: Stopped target remote-fs-pre.target. May 15 01:12:00.345461 systemd[1]: Stopped target sysinit.target. May 15 01:12:00.345658 systemd[1]: Stopped target local-fs.target. May 15 01:12:00.345895 systemd[1]: Stopped target local-fs-pre.target. May 15 01:12:00.346064 systemd[1]: Stopped target swap.target. May 15 01:12:00.346225 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 01:12:00.346289 systemd[1]: Stopped dracut-pre-mount.service. May 15 01:12:00.346571 systemd[1]: Stopped target cryptsetup.target. May 15 01:12:00.349110 kernel: audit: type=1131 audit(1747271520.344:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.349049 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 01:12:00.349107 systemd[1]: Stopped dracut-initqueue.service. May 15 01:12:00.349290 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 01:12:00.352062 kernel: audit: type=1131 audit(1747271520.347:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.349346 systemd[1]: Stopped ignition-fetch-offline.service. May 15 01:12:00.352001 systemd[1]: Stopped target paths.target. May 15 01:12:00.352143 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 01:12:00.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.353895 systemd[1]: Stopped systemd-ask-password-console.path. May 15 01:12:00.354051 systemd[1]: Stopped target slices.target. May 15 01:12:00.354233 systemd[1]: Stopped target sockets.target. May 15 01:12:00.354414 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 01:12:00.354481 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 01:12:00.354770 systemd[1]: ignition-files.service: Deactivated successfully. May 15 01:12:00.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.354827 systemd[1]: Stopped ignition-files.service. May 15 01:12:00.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.355482 systemd[1]: Stopping ignition-mount.service... May 15 01:12:00.358996 iscsid[741]: iscsid shutting down. May 15 01:12:00.357281 systemd[1]: Stopping iscsid.service... May 15 01:12:00.357950 systemd[1]: Stopping sysroot-boot.service... May 15 01:12:00.358064 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 01:12:00.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.358161 systemd[1]: Stopped systemd-udev-trigger.service. May 15 01:12:00.358361 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 01:12:00.358431 systemd[1]: Stopped dracut-pre-trigger.service. May 15 01:12:00.359616 systemd[1]: iscsid.service: Deactivated successfully. May 15 01:12:00.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.359686 systemd[1]: Stopped iscsid.service. May 15 01:12:00.360110 systemd[1]: iscsid.socket: Deactivated successfully. May 15 01:12:00.360163 systemd[1]: Closed iscsid.socket. May 15 01:12:00.360698 systemd[1]: Stopping iscsiuio.service... May 15 01:12:00.360941 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 01:12:00.360999 systemd[1]: Finished initrd-cleanup.service. May 15 01:12:00.361724 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 01:12:00.361778 systemd[1]: Stopped iscsiuio.service. May 15 01:12:00.361931 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 01:12:00.361951 systemd[1]: Closed iscsiuio.socket. May 15 01:12:00.364515 ignition[889]: INFO : Ignition 2.14.0 May 15 01:12:00.364705 ignition[889]: INFO : Stage: umount May 15 01:12:00.364898 ignition[889]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 01:12:00.365052 ignition[889]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 01:12:00.366539 ignition[889]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 01:12:00.367961 ignition[889]: INFO : umount: umount passed May 15 01:12:00.368105 ignition[889]: INFO : Ignition finished successfully May 15 01:12:00.368651 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 01:12:00.368703 systemd[1]: Stopped ignition-mount.service. May 15 01:12:00.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.369012 systemd[1]: Stopped target network.target. May 15 01:12:00.369116 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 01:12:00.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.369139 systemd[1]: Stopped ignition-disks.service. May 15 01:12:00.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.369292 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 01:12:00.369311 systemd[1]: Stopped ignition-kargs.service. May 15 01:12:00.369444 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 01:12:00.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.369463 systemd[1]: Stopped ignition-setup.service. May 15 01:12:00.369678 systemd[1]: Stopping systemd-networkd.service... May 15 01:12:00.370044 systemd[1]: Stopping systemd-resolved.service... May 15 01:12:00.373416 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 01:12:00.373473 systemd[1]: Stopped systemd-networkd.service. May 15 01:12:00.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.373905 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 01:12:00.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.373925 systemd[1]: Closed systemd-networkd.socket. May 15 01:12:00.374370 systemd[1]: Stopping network-cleanup.service... May 15 01:12:00.374466 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 01:12:00.374495 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 01:12:00.374625 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. May 15 01:12:00.374647 systemd[1]: Stopped afterburn-network-kargs.service. May 15 01:12:00.374755 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 01:12:00.374778 systemd[1]: Stopped systemd-sysctl.service. May 15 01:12:00.377000 audit: BPF prog-id=9 op=UNLOAD May 15 01:12:00.375379 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 01:12:00.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.375398 systemd[1]: Stopped systemd-modules-load.service. May 15 01:12:00.375537 systemd[1]: Stopping systemd-udevd.service... May 15 01:12:00.378516 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 01:12:00.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.378775 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 01:12:00.378821 systemd[1]: Stopped systemd-resolved.service. May 15 01:12:00.380000 audit: BPF prog-id=6 op=UNLOAD May 15 01:12:00.380193 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 01:12:00.380255 systemd[1]: Stopped systemd-udevd.service. May 15 01:12:00.380903 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 01:12:00.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.380929 systemd[1]: Closed systemd-udevd-control.socket. May 15 01:12:00.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.382609 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 01:12:00.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.382626 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 01:12:00.382767 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 01:12:00.382789 systemd[1]: Stopped dracut-pre-udev.service. May 15 01:12:00.382941 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 01:12:00.382960 systemd[1]: Stopped dracut-cmdline.service. May 15 01:12:00.383116 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 01:12:00.383134 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 01:12:00.383849 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 01:12:00.384620 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 01:12:00.384786 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 01:12:00.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.385115 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 01:12:00.385266 systemd[1]: Stopped kmod-static-nodes.service. May 15 01:12:00.385489 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 01:12:00.385645 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 01:12:00.386457 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 01:12:00.386885 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 01:12:00.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.387116 systemd[1]: Stopped network-cleanup.service. May 15 01:12:00.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.387589 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 01:12:00.387777 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 01:12:00.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.389040 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 01:12:00.503192 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 01:12:00.503485 systemd[1]: Stopped sysroot-boot.service. May 15 01:12:00.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.503923 systemd[1]: Reached target initrd-switch-root.target. May 15 01:12:00.504215 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 01:12:00.504423 systemd[1]: Stopped initrd-setup-root.service. May 15 01:12:00.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:00.505293 systemd[1]: Starting initrd-switch-root.service... May 15 01:12:00.513720 systemd[1]: Switching root. May 15 01:12:00.533593 systemd-journald[217]: Journal stopped May 15 01:12:02.764663 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). May 15 01:12:02.764682 kernel: SELinux: Class mctp_socket not defined in policy. May 15 01:12:02.764690 kernel: SELinux: Class anon_inode not defined in policy. May 15 01:12:02.764696 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 01:12:02.764702 kernel: SELinux: policy capability network_peer_controls=1 May 15 01:12:02.764708 kernel: SELinux: policy capability open_perms=1 May 15 01:12:02.764715 kernel: SELinux: policy capability extended_socket_class=1 May 15 01:12:02.764721 kernel: SELinux: policy capability always_check_network=0 May 15 01:12:02.764727 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 01:12:02.764733 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 01:12:02.764738 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 01:12:02.764744 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 01:12:02.764752 systemd[1]: Successfully loaded SELinux policy in 47.212ms. May 15 01:12:02.764760 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.363ms. May 15 01:12:02.764768 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 01:12:02.764775 systemd[1]: Detected virtualization vmware. May 15 01:12:02.764783 systemd[1]: Detected architecture x86-64. May 15 01:12:02.764790 systemd[1]: Detected first boot. May 15 01:12:02.764797 systemd[1]: Initializing machine ID from random generator. May 15 01:12:02.764803 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 01:12:02.764810 systemd[1]: Populated /etc with preset unit settings. May 15 01:12:02.764817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 01:12:02.764824 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 01:12:02.764832 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 01:12:02.764840 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 01:12:02.764847 systemd[1]: Stopped initrd-switch-root.service. May 15 01:12:02.764853 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 01:12:02.764861 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 01:12:02.764876 systemd[1]: Created slice system-addon\x2drun.slice. May 15 01:12:02.764885 systemd[1]: Created slice system-getty.slice. May 15 01:12:02.764892 systemd[1]: Created slice system-modprobe.slice. May 15 01:12:02.764901 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 01:12:02.764908 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 01:12:02.764914 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 01:12:02.764922 systemd[1]: Created slice user.slice. May 15 01:12:02.764929 systemd[1]: Started systemd-ask-password-console.path. May 15 01:12:02.764936 systemd[1]: Started systemd-ask-password-wall.path. May 15 01:12:02.764942 systemd[1]: Set up automount boot.automount. May 15 01:12:02.764949 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 01:12:02.764957 systemd[1]: Stopped target initrd-switch-root.target. May 15 01:12:02.764965 systemd[1]: Stopped target initrd-fs.target. May 15 01:12:02.764973 systemd[1]: Stopped target initrd-root-fs.target. May 15 01:12:02.764980 systemd[1]: Reached target integritysetup.target. May 15 01:12:02.764988 systemd[1]: Reached target remote-cryptsetup.target. May 15 01:12:02.765122 systemd[1]: Reached target remote-fs.target. May 15 01:12:02.765132 systemd[1]: Reached target slices.target. May 15 01:12:02.765139 systemd[1]: Reached target swap.target. May 15 01:12:02.765146 systemd[1]: Reached target torcx.target. May 15 01:12:02.765155 systemd[1]: Reached target veritysetup.target. May 15 01:12:02.765162 systemd[1]: Listening on systemd-coredump.socket. May 15 01:12:02.765169 systemd[1]: Listening on systemd-initctl.socket. May 15 01:12:02.765176 systemd[1]: Listening on systemd-networkd.socket. May 15 01:12:02.765183 systemd[1]: Listening on systemd-udevd-control.socket. May 15 01:12:02.765191 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 01:12:02.765200 systemd[1]: Listening on systemd-userdbd.socket. May 15 01:12:02.765208 systemd[1]: Mounting dev-hugepages.mount... May 15 01:12:02.765215 systemd[1]: Mounting dev-mqueue.mount... May 15 01:12:02.765223 systemd[1]: Mounting media.mount... May 15 01:12:02.765230 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 01:12:02.765237 systemd[1]: Mounting sys-kernel-debug.mount... May 15 01:12:02.765245 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 01:12:02.765254 systemd[1]: Mounting tmp.mount... May 15 01:12:02.765261 systemd[1]: Starting flatcar-tmpfiles.service... May 15 01:12:02.765268 systemd[1]: Starting ignition-delete-config.service... May 15 01:12:02.765275 systemd[1]: Starting kmod-static-nodes.service... May 15 01:12:02.765283 systemd[1]: Starting modprobe@configfs.service... May 15 01:12:02.765290 systemd[1]: Starting modprobe@dm_mod.service... May 15 01:12:02.765297 systemd[1]: Starting modprobe@drm.service... May 15 01:12:02.765304 systemd[1]: Starting modprobe@efi_pstore.service... May 15 01:12:02.765312 systemd[1]: Starting modprobe@fuse.service... May 15 01:12:02.765320 systemd[1]: Starting modprobe@loop.service... May 15 01:12:02.765328 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 01:12:02.765335 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 01:12:02.765342 systemd[1]: Stopped systemd-fsck-root.service. May 15 01:12:02.765349 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 01:12:02.765357 systemd[1]: Stopped systemd-fsck-usr.service. May 15 01:12:02.765364 systemd[1]: Stopped systemd-journald.service. May 15 01:12:02.765372 systemd[1]: Starting systemd-journald.service... May 15 01:12:02.765379 systemd[1]: Starting systemd-modules-load.service... May 15 01:12:02.765387 systemd[1]: Starting systemd-network-generator.service... May 15 01:12:02.765395 systemd[1]: Starting systemd-remount-fs.service... May 15 01:12:02.765402 systemd[1]: Starting systemd-udev-trigger.service... May 15 01:12:02.765409 systemd[1]: verity-setup.service: Deactivated successfully. May 15 01:12:02.765417 systemd[1]: Stopped verity-setup.service. May 15 01:12:02.765424 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 01:12:02.765432 systemd[1]: Mounted dev-hugepages.mount. May 15 01:12:02.765439 systemd[1]: Mounted dev-mqueue.mount. May 15 01:12:02.765446 systemd[1]: Mounted media.mount. May 15 01:12:02.765455 systemd[1]: Mounted sys-kernel-debug.mount. May 15 01:12:02.765462 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 01:12:02.765469 systemd[1]: Mounted tmp.mount. May 15 01:12:02.765477 systemd[1]: Finished kmod-static-nodes.service. May 15 01:12:02.765486 systemd-journald[1014]: Journal started May 15 01:12:02.765514 systemd-journald[1014]: Runtime Journal (/run/log/journal/41c8e4fefd7d42248eccfccb55232a5b) is 4.8M, max 38.8M, 34.0M free. May 15 01:12:00.880000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 01:12:01.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 01:12:01.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 01:12:01.010000 audit: BPF prog-id=10 op=LOAD May 15 01:12:01.010000 audit: BPF prog-id=10 op=UNLOAD May 15 01:12:01.010000 audit: BPF prog-id=11 op=LOAD May 15 01:12:01.010000 audit: BPF prog-id=11 op=UNLOAD May 15 01:12:01.089000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 01:12:01.089000 audit[922]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:12:02.769463 systemd[1]: Started systemd-journald.service. May 15 01:12:01.089000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 01:12:01.091000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 01:12:01.091000 audit[922]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:12:01.091000 audit: CWD cwd="/" May 15 01:12:01.091000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:01.091000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:01.091000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 01:12:02.666000 audit: BPF prog-id=12 op=LOAD May 15 01:12:02.666000 audit: BPF prog-id=3 op=UNLOAD May 15 01:12:02.666000 audit: BPF prog-id=13 op=LOAD May 15 01:12:02.666000 audit: BPF prog-id=14 op=LOAD May 15 01:12:02.666000 audit: BPF prog-id=4 op=UNLOAD May 15 01:12:02.666000 audit: BPF prog-id=5 op=UNLOAD May 15 01:12:02.668000 audit: BPF prog-id=15 op=LOAD May 15 01:12:02.668000 audit: BPF prog-id=12 op=UNLOAD May 15 01:12:02.668000 audit: BPF prog-id=16 op=LOAD May 15 01:12:02.668000 audit: BPF prog-id=17 op=LOAD May 15 01:12:02.668000 audit: BPF prog-id=13 op=UNLOAD May 15 01:12:02.668000 audit: BPF prog-id=14 op=UNLOAD May 15 01:12:02.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.678000 audit: BPF prog-id=15 op=UNLOAD May 15 01:12:02.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.738000 audit: BPF prog-id=18 op=LOAD May 15 01:12:02.738000 audit: BPF prog-id=19 op=LOAD May 15 01:12:02.738000 audit: BPF prog-id=20 op=LOAD May 15 01:12:02.738000 audit: BPF prog-id=16 op=UNLOAD May 15 01:12:02.738000 audit: BPF prog-id=17 op=UNLOAD May 15 01:12:02.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.761000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 01:12:02.761000 audit[1014]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd23075ad0 a2=4000 a3=7ffd23075b6c items=0 ppid=1 pid=1014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:12:02.761000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 01:12:02.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:01.089421 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 01:12:02.667127 systemd[1]: Queued start job for default target multi-user.target. May 15 01:12:01.090000 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 01:12:02.667134 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 15 01:12:01.090013 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 01:12:02.670297 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 01:12:01.090033 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 01:12:02.768094 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 01:12:01.090039 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 01:12:02.768167 systemd[1]: Finished modprobe@configfs.service. May 15 01:12:01.090057 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 01:12:02.768378 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 01:12:02.775063 kernel: fuse: init (API version 7.34) May 15 01:12:01.090064 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 01:12:02.768444 systemd[1]: Finished modprobe@dm_mod.service. May 15 01:12:01.090196 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 01:12:02.768643 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 01:12:01.090219 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 01:12:02.769537 systemd[1]: Finished modprobe@drm.service. May 15 01:12:02.775316 jq[989]: true May 15 01:12:01.090229 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 01:12:02.769817 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 01:12:01.090720 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 01:12:02.769955 systemd[1]: Finished modprobe@efi_pstore.service. May 15 01:12:01.090741 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 01:12:02.770208 systemd[1]: Finished systemd-modules-load.service. May 15 01:12:01.090753 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 15 01:12:02.770421 systemd[1]: Finished systemd-network-generator.service. May 15 01:12:01.090762 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 01:12:02.770624 systemd[1]: Finished systemd-remount-fs.service. May 15 01:12:01.090771 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 15 01:12:02.771336 systemd[1]: Reached target network-pre.target. May 15 01:12:01.090779 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 01:12:02.772293 systemd[1]: Mounting sys-kernel-config.mount... May 15 01:12:02.473339 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:02Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 01:12:02.773957 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 01:12:02.473494 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:02Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 01:12:02.776648 systemd[1]: Starting systemd-hwdb-update.service... May 15 01:12:02.473558 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:02Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 01:12:02.473664 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:02Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 01:12:02.473695 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:02Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 01:12:02.777645 jq[1023]: true May 15 01:12:02.473738 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2025-05-15T01:12:02Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 01:12:02.778241 systemd[1]: Starting systemd-journal-flush.service... May 15 01:12:02.778367 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 01:12:02.779041 systemd[1]: Starting systemd-random-seed.service... May 15 01:12:02.779783 systemd[1]: Starting systemd-sysctl.service... May 15 01:12:02.780964 systemd[1]: Mounted sys-kernel-config.mount. May 15 01:12:02.785953 systemd-journald[1014]: Time spent on flushing to /var/log/journal/41c8e4fefd7d42248eccfccb55232a5b is 49.418ms for 1989 entries. May 15 01:12:02.785953 systemd-journald[1014]: System Journal (/var/log/journal/41c8e4fefd7d42248eccfccb55232a5b) is 8.0M, max 584.8M, 576.8M free. May 15 01:12:02.864594 systemd-journald[1014]: Received client request to flush runtime journal. May 15 01:12:02.864637 kernel: loop: module loaded May 15 01:12:02.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.795061 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 01:12:02.795146 systemd[1]: Finished modprobe@fuse.service. May 15 01:12:02.795414 systemd[1]: Finished systemd-random-seed.service. May 15 01:12:02.795555 systemd[1]: Reached target first-boot-complete.target. May 15 01:12:02.796560 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 01:12:02.798945 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 01:12:02.802141 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 01:12:02.802229 systemd[1]: Finished modprobe@loop.service. May 15 01:12:02.802405 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 01:12:02.814364 systemd[1]: Finished systemd-sysctl.service. May 15 01:12:02.830964 systemd[1]: Finished flatcar-tmpfiles.service. May 15 01:12:02.831908 systemd[1]: Starting systemd-sysusers.service... May 15 01:12:02.865138 systemd[1]: Finished systemd-journal-flush.service. May 15 01:12:02.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.886455 systemd[1]: Finished systemd-sysusers.service. May 15 01:12:02.887415 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 01:12:02.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.897484 systemd[1]: Finished systemd-udev-trigger.service. May 15 01:12:02.898364 systemd[1]: Starting systemd-udev-settle.service... May 15 01:12:02.901137 ignition[1024]: Ignition 2.14.0 May 15 01:12:02.902083 ignition[1024]: deleting config from guestinfo properties May 15 01:12:02.904984 ignition[1024]: Successfully deleted config May 15 01:12:02.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.905907 systemd[1]: Finished ignition-delete-config.service. May 15 01:12:02.908151 udevadm[1055]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 15 01:12:02.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:02.917633 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 01:12:03.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:03.203000 audit: BPF prog-id=21 op=LOAD May 15 01:12:03.203000 audit: BPF prog-id=22 op=LOAD May 15 01:12:03.203000 audit: BPF prog-id=7 op=UNLOAD May 15 01:12:03.203000 audit: BPF prog-id=8 op=UNLOAD May 15 01:12:03.204901 systemd[1]: Finished systemd-hwdb-update.service. May 15 01:12:03.205966 systemd[1]: Starting systemd-udevd.service... May 15 01:12:03.216816 systemd-udevd[1056]: Using default interface naming scheme 'v252'. May 15 01:12:03.236369 systemd[1]: Started systemd-udevd.service. May 15 01:12:03.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:03.235000 audit: BPF prog-id=23 op=LOAD May 15 01:12:03.237608 systemd[1]: Starting systemd-networkd.service... May 15 01:12:03.244000 audit: BPF prog-id=24 op=LOAD May 15 01:12:03.244000 audit: BPF prog-id=25 op=LOAD May 15 01:12:03.244000 audit: BPF prog-id=26 op=LOAD May 15 01:12:03.246345 systemd[1]: Starting systemd-userdbd.service... May 15 01:12:03.261179 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 01:12:03.268435 systemd[1]: Started systemd-userdbd.service. May 15 01:12:03.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:03.299039 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 01:12:03.303883 kernel: ACPI: button: Power Button [PWRF] May 15 01:12:03.313367 systemd-networkd[1064]: lo: Link UP May 15 01:12:03.313372 systemd-networkd[1064]: lo: Gained carrier May 15 01:12:03.313643 systemd-networkd[1064]: Enumeration completed May 15 01:12:03.313695 systemd[1]: Started systemd-networkd.service. May 15 01:12:03.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:03.313891 systemd-networkd[1064]: ens192: Configuring with /etc/systemd/network/00-vmware.network. May 15 01:12:03.316671 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 15 01:12:03.316785 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 15 01:12:03.318042 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready May 15 01:12:03.318161 systemd-networkd[1064]: ens192: Link UP May 15 01:12:03.318283 systemd-networkd[1064]: ens192: Gained carrier May 15 01:12:03.376110 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 01:12:03.377000 audit[1061]: AVC avc: denied { confidentiality } for pid=1061 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 01:12:03.377000 audit[1061]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563a3eb4e050 a1=338ac a2=7f0a685c8bc5 a3=5 items=110 ppid=1056 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:12:03.377000 audit: CWD cwd="/" May 15 01:12:03.377000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=1 name=(null) inode=17087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=2 name=(null) inode=17087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=3 name=(null) inode=17088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=4 name=(null) inode=17087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=5 name=(null) inode=17089 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=6 name=(null) inode=17087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=7 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=8 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=9 name=(null) inode=17091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=10 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=11 name=(null) inode=17092 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=12 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=13 name=(null) inode=17093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=14 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=15 name=(null) inode=17094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=16 name=(null) inode=17090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=17 name=(null) inode=17095 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=18 name=(null) inode=17087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=19 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=20 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=21 name=(null) inode=17097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=22 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=23 name=(null) inode=17098 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=24 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=25 name=(null) inode=17099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=26 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=27 name=(null) inode=17100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=28 name=(null) inode=17096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=29 name=(null) inode=17101 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=30 name=(null) inode=17087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=31 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=32 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=33 name=(null) inode=17103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=34 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=35 name=(null) inode=17104 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=36 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=37 name=(null) inode=17105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=38 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=39 name=(null) inode=17106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=40 name=(null) inode=17102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=41 name=(null) inode=17107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=42 name=(null) inode=17087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=43 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=44 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=45 name=(null) inode=17109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=46 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=47 name=(null) inode=17110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=48 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=49 name=(null) inode=17111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=50 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=51 name=(null) inode=17112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=52 name=(null) inode=17108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=53 name=(null) inode=17113 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=55 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=56 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=57 name=(null) inode=17115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=58 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=59 name=(null) inode=17116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=60 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=61 name=(null) inode=17117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=62 name=(null) inode=17117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=63 name=(null) inode=17118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=64 name=(null) inode=17117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=65 name=(null) inode=17119 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=66 name=(null) inode=17117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=67 name=(null) inode=17120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=68 name=(null) inode=17117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=69 name=(null) inode=17121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=70 name=(null) inode=17117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=71 name=(null) inode=17122 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=72 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=73 name=(null) inode=17123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=74 name=(null) inode=17123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=75 name=(null) inode=17124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=76 name=(null) inode=17123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=77 name=(null) inode=17125 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=78 name=(null) inode=17123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=79 name=(null) inode=17126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=80 name=(null) inode=17123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=81 name=(null) inode=17127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=82 name=(null) inode=17123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=83 name=(null) inode=17128 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=84 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=85 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=86 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=87 name=(null) inode=17130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=88 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=89 name=(null) inode=17131 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=90 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=91 name=(null) inode=17132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=92 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=93 name=(null) inode=17133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=94 name=(null) inode=17129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=95 name=(null) inode=17134 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=96 name=(null) inode=17114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=97 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=98 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=99 name=(null) inode=17136 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=100 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=101 name=(null) inode=17137 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=102 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=103 name=(null) inode=17138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=104 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=105 name=(null) inode=17139 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=106 name=(null) inode=17135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=107 name=(null) inode=17140 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PATH item=109 name=(null) inode=17141 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:12:03.377000 audit: PROCTITLE proctitle="(udev-worker)" May 15 01:12:03.390881 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! May 15 01:12:03.395886 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 May 15 01:12:03.403267 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc May 15 01:12:03.403351 kernel: Guest personality initialized and is active May 15 01:12:03.404984 kernel: VMCI host device registered (name=vmci, major=10, minor=125) May 15 01:12:03.405014 kernel: Initialized host personality May 15 01:12:03.411112 (udev-worker)[1065]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. May 15 01:12:03.413013 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 May 15 01:12:03.416875 kernel: mousedev: PS/2 mouse device common for all mice May 15 01:12:03.445065 systemd[1]: Finished systemd-udev-settle.service. May 15 01:12:03.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:03.446087 systemd[1]: Starting lvm2-activation-early.service... May 15 01:12:03.462246 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 01:12:03.482327 systemd[1]: Finished lvm2-activation-early.service. May 15 01:12:03.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:03.482538 systemd[1]: Reached target cryptsetup.target. May 15 01:12:03.483519 systemd[1]: Starting lvm2-activation.service... May 15 01:12:03.485902 lvm[1090]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 01:12:03.505350 systemd[1]: Finished lvm2-activation.service. May 15 01:12:03.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:03.505507 systemd[1]: Reached target local-fs-pre.target. May 15 01:12:03.506208 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 01:12:03.512099 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 01:12:03.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:03.757860 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 01:12:03.757912 systemd[1]: Reached target local-fs.target. May 15 01:12:03.758032 systemd[1]: Reached target machines.target. May 15 01:12:03.759087 systemd[1]: Starting ldconfig.service... May 15 01:12:03.759704 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 01:12:03.759782 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 01:12:03.760598 systemd[1]: Starting systemd-boot-update.service... May 15 01:12:03.762067 systemd[1]: Starting systemd-machine-id-commit.service... May 15 01:12:03.763602 systemd[1]: Starting systemd-sysext.service... May 15 01:12:03.765213 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1094 (bootctl) May 15 01:12:03.765968 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 01:12:03.777975 systemd[1]: Unmounting usr-share-oem.mount... May 15 01:12:03.790724 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 01:12:03.790848 systemd[1]: Unmounted usr-share-oem.mount. May 15 01:12:03.810941 kernel: loop0: detected capacity change from 0 to 210664 May 15 01:12:04.069168 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 01:12:04.070052 systemd[1]: Finished systemd-machine-id-commit.service. May 15 01:12:04.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.094885 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 01:12:04.108218 systemd-fsck[1101]: fsck.fat 4.2 (2021-01-31) May 15 01:12:04.108218 systemd-fsck[1101]: /dev/sda1: 790 files, 120690/258078 clusters May 15 01:12:04.109824 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 01:12:04.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.110965 systemd[1]: Mounting boot.mount... May 15 01:12:04.114879 kernel: loop1: detected capacity change from 0 to 210664 May 15 01:12:04.120580 systemd[1]: Mounted boot.mount. May 15 01:12:04.131158 systemd[1]: Finished systemd-boot-update.service. May 15 01:12:04.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.141215 (sd-sysext)[1105]: Using extensions 'kubernetes'. May 15 01:12:04.142004 (sd-sysext)[1105]: Merged extensions into '/usr'. May 15 01:12:04.151912 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 01:12:04.152826 systemd[1]: Mounting usr-share-oem.mount... May 15 01:12:04.153555 systemd[1]: Starting modprobe@dm_mod.service... May 15 01:12:04.155187 systemd[1]: Starting modprobe@efi_pstore.service... May 15 01:12:04.156073 systemd[1]: Starting modprobe@loop.service... May 15 01:12:04.156210 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 01:12:04.156283 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 01:12:04.156351 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 01:12:04.157762 systemd[1]: Mounted usr-share-oem.mount. May 15 01:12:04.158892 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 01:12:04.158967 systemd[1]: Finished modprobe@dm_mod.service. May 15 01:12:04.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.159264 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 01:12:04.159333 systemd[1]: Finished modprobe@efi_pstore.service. May 15 01:12:04.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.159616 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 01:12:04.159716 systemd[1]: Finished modprobe@loop.service. May 15 01:12:04.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.160033 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 01:12:04.160098 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 01:12:04.160732 systemd[1]: Finished systemd-sysext.service. May 15 01:12:04.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.161711 systemd[1]: Starting ensure-sysext.service... May 15 01:12:04.162421 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 01:12:04.167045 systemd[1]: Reloading. May 15 01:12:04.172602 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 01:12:04.174503 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 01:12:04.177092 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 01:12:04.204754 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-05-15T01:12:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 01:12:04.205397 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2025-05-15T01:12:04Z" level=info msg="torcx already run" May 15 01:12:04.272060 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 01:12:04.272070 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 01:12:04.284261 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 01:12:04.318000 audit: BPF prog-id=27 op=LOAD May 15 01:12:04.318000 audit: BPF prog-id=24 op=UNLOAD May 15 01:12:04.318000 audit: BPF prog-id=28 op=LOAD May 15 01:12:04.318000 audit: BPF prog-id=29 op=LOAD May 15 01:12:04.318000 audit: BPF prog-id=25 op=UNLOAD May 15 01:12:04.318000 audit: BPF prog-id=26 op=UNLOAD May 15 01:12:04.318000 audit: BPF prog-id=30 op=LOAD May 15 01:12:04.319000 audit: BPF prog-id=18 op=UNLOAD May 15 01:12:04.319000 audit: BPF prog-id=31 op=LOAD May 15 01:12:04.319000 audit: BPF prog-id=32 op=LOAD May 15 01:12:04.319000 audit: BPF prog-id=19 op=UNLOAD May 15 01:12:04.319000 audit: BPF prog-id=20 op=UNLOAD May 15 01:12:04.319000 audit: BPF prog-id=33 op=LOAD May 15 01:12:04.319000 audit: BPF prog-id=23 op=UNLOAD May 15 01:12:04.320000 audit: BPF prog-id=34 op=LOAD May 15 01:12:04.320000 audit: BPF prog-id=35 op=LOAD May 15 01:12:04.320000 audit: BPF prog-id=21 op=UNLOAD May 15 01:12:04.320000 audit: BPF prog-id=22 op=UNLOAD May 15 01:12:04.323527 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 01:12:04.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.326442 systemd[1]: Starting audit-rules.service... May 15 01:12:04.327246 systemd[1]: Starting clean-ca-certificates.service... May 15 01:12:04.330918 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 01:12:04.329000 audit: BPF prog-id=36 op=LOAD May 15 01:12:04.332191 systemd[1]: Starting systemd-resolved.service... May 15 01:12:04.331000 audit: BPF prog-id=37 op=LOAD May 15 01:12:04.333348 systemd[1]: Starting systemd-timesyncd.service... May 15 01:12:04.334266 systemd[1]: Starting systemd-update-utmp.service... May 15 01:12:04.334658 systemd[1]: Finished clean-ca-certificates.service. May 15 01:12:04.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.334900 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 01:12:04.345458 systemd[1]: Starting modprobe@dm_mod.service... May 15 01:12:04.346224 systemd[1]: Starting modprobe@efi_pstore.service... May 15 01:12:04.346935 systemd[1]: Starting modprobe@loop.service... May 15 01:12:04.347055 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 01:12:04.347126 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 01:12:04.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.347196 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 01:12:04.347574 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 01:12:04.347660 systemd[1]: Finished modprobe@dm_mod.service. May 15 01:12:04.348151 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 01:12:04.348217 systemd[1]: Finished modprobe@loop.service. May 15 01:12:04.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.350566 systemd[1]: Starting modprobe@dm_mod.service... May 15 01:12:04.351319 systemd[1]: Starting modprobe@loop.service... May 15 01:12:04.349000 audit[1198]: SYSTEM_BOOT pid=1198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 01:12:04.352098 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 01:12:04.352173 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 01:12:04.352245 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 01:12:04.353676 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 01:12:04.353756 systemd[1]: Finished modprobe@dm_mod.service. May 15 01:12:04.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.355501 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 01:12:04.355577 systemd[1]: Finished modprobe@loop.service. May 15 01:12:04.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.355847 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 01:12:04.360509 systemd[1]: Starting modprobe@dm_mod.service... May 15 01:12:04.361327 systemd[1]: Starting modprobe@drm.service... May 15 01:12:04.362204 systemd[1]: Starting modprobe@loop.service... May 15 01:12:04.363677 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 01:12:04.363798 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 01:12:04.364851 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 01:12:04.365002 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 01:12:04.365777 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 01:12:04.365874 systemd[1]: Finished modprobe@efi_pstore.service. May 15 01:12:04.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.366661 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 01:12:04.366733 systemd[1]: Finished modprobe@dm_mod.service. May 15 01:12:04.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.367319 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 01:12:04.367385 systemd[1]: Finished modprobe@drm.service. May 15 01:12:04.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.368322 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 01:12:04.369181 systemd[1]: Finished ensure-sysext.service. May 15 01:12:04.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.369462 systemd[1]: Finished systemd-update-utmp.service. May 15 01:12:04.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.375779 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 01:12:04.375858 systemd[1]: Finished modprobe@loop.service. May 15 01:12:04.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.376023 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 01:12:04.410970 systemd[1]: Started systemd-timesyncd.service. May 15 01:12:04.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.411178 systemd[1]: Reached target time-set.target. May 15 01:12:04.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:12:04.413292 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 01:12:04.416000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 01:12:04.416000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd02939b60 a2=420 a3=0 items=0 ppid=1192 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:12:04.416000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 01:12:04.418850 augenrules[1222]: No rules May 15 01:12:04.418815 systemd-resolved[1196]: Positive Trust Anchors: May 15 01:12:04.418823 systemd-resolved[1196]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 01:12:04.418842 systemd-resolved[1196]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 01:12:04.419554 systemd[1]: Finished audit-rules.service. May 15 01:12:04.440991 ldconfig[1093]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 01:12:04.441335 systemd-resolved[1196]: Defaulting to hostname 'linux'. May 15 01:12:04.442644 systemd[1]: Started systemd-resolved.service. May 15 01:12:04.442799 systemd[1]: Reached target network.target. May 15 01:12:04.442900 systemd[1]: Reached target nss-lookup.target. May 15 01:12:04.456950 systemd[1]: Finished ldconfig.service. May 15 01:12:04.458002 systemd[1]: Starting systemd-update-done.service... May 15 01:12:04.462738 systemd[1]: Finished systemd-update-done.service. May 15 01:12:04.462920 systemd[1]: Reached target sysinit.target. May 15 01:12:04.463065 systemd[1]: Started motdgen.path. May 15 01:12:04.463201 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 01:12:04.463385 systemd[1]: Started logrotate.timer. May 15 01:12:04.463516 systemd[1]: Started mdadm.timer. May 15 01:12:04.463600 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 01:12:04.463696 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 01:12:04.463718 systemd[1]: Reached target paths.target. May 15 01:12:04.463802 systemd[1]: Reached target timers.target. May 15 01:12:04.464064 systemd[1]: Listening on dbus.socket. May 15 01:12:04.464889 systemd[1]: Starting docker.socket... May 15 01:12:04.467010 systemd[1]: Listening on sshd.socket. May 15 01:12:04.467169 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 01:12:04.467412 systemd[1]: Listening on docker.socket. May 15 01:12:04.467539 systemd[1]: Reached target sockets.target. May 15 01:12:04.467634 systemd[1]: Reached target basic.target. May 15 01:12:04.467745 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 01:12:04.467763 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 01:12:04.468418 systemd[1]: Starting containerd.service... May 15 01:12:04.469205 systemd[1]: Starting dbus.service... May 15 01:12:04.470923 systemd[1]: Starting enable-oem-cloudinit.service... May 15 01:12:04.478347 jq[1232]: false May 15 01:12:04.471673 systemd[1]: Starting extend-filesystems.service... May 15 01:12:04.471806 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 01:12:04.472550 systemd[1]: Starting motdgen.service... May 15 01:12:04.473617 systemd[1]: Starting prepare-helm.service... May 15 01:12:04.474369 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 01:12:04.475185 systemd[1]: Starting sshd-keygen.service... May 15 01:12:04.476671 systemd[1]: Starting systemd-logind.service... May 15 01:12:04.476778 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 01:12:04.476813 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 01:12:04.477210 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 01:12:04.477696 systemd[1]: Starting update-engine.service... May 15 01:12:04.478862 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 01:12:04.480948 systemd[1]: Starting vmtoolsd.service... May 15 01:12:04.481818 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 01:12:04.481949 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 01:12:04.489563 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 01:12:04.489673 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 01:12:04.493530 tar[1244]: linux-amd64/helm May 15 01:12:04.494295 jq[1241]: true May 15 01:12:04.504210 systemd[1]: Started vmtoolsd.service. May 15 01:12:04.512035 extend-filesystems[1233]: Found loop1 May 15 01:12:04.513034 jq[1255]: true May 15 01:12:04.513249 extend-filesystems[1233]: Found sda May 15 01:12:04.513441 extend-filesystems[1233]: Found sda1 May 15 01:12:04.513595 extend-filesystems[1233]: Found sda2 May 15 01:12:04.513747 extend-filesystems[1233]: Found sda3 May 15 01:12:04.513936 extend-filesystems[1233]: Found usr May 15 01:12:04.514077 extend-filesystems[1233]: Found sda4 May 15 01:12:04.514280 extend-filesystems[1233]: Found sda6 May 15 01:12:04.517632 extend-filesystems[1233]: Found sda7 May 15 01:12:04.517814 extend-filesystems[1233]: Found sda9 May 15 01:12:04.518110 extend-filesystems[1233]: Checking size of /dev/sda9 May 15 01:12:04.521478 dbus-daemon[1231]: [system] SELinux support is enabled May 15 01:12:04.521609 systemd[1]: Started dbus.service. May 15 01:12:04.523143 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 01:12:04.523159 systemd[1]: Reached target system-config.target. May 15 01:12:04.523275 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 01:12:04.523284 systemd[1]: Reached target user-config.target. May 15 01:12:04.533139 systemd[1]: motdgen.service: Deactivated successfully. May 15 01:12:04.533259 systemd[1]: Finished motdgen.service. May 15 01:12:04.541936 extend-filesystems[1233]: Old size kept for /dev/sda9 May 15 01:12:04.545990 extend-filesystems[1233]: Found sr0 May 15 01:12:04.546522 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 01:12:04.546620 systemd[1]: Finished extend-filesystems.service. May 15 01:12:04.567253 env[1250]: time="2025-05-15T01:12:04.567176770Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 01:12:04.568460 bash[1284]: Updated "/home/core/.ssh/authorized_keys" May 15 01:12:04.568796 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 01:12:04.577888 kernel: NET: Registered PF_VSOCK protocol family May 15 01:12:04.594961 systemd-logind[1239]: Watching system buttons on /dev/input/event1 (Power Button) May 15 01:12:04.595157 systemd-logind[1239]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 01:12:04.595302 systemd-logind[1239]: New seat seat0. May 15 01:12:04.596182 systemd[1]: Started systemd-logind.service. May 15 01:12:04.602387 update_engine[1240]: I0515 01:12:04.601656 1240 main.cc:92] Flatcar Update Engine starting May 15 01:12:04.604270 systemd[1]: Started update-engine.service. May 15 01:12:04.605702 systemd[1]: Started locksmithd.service. May 15 01:12:04.606197 update_engine[1240]: I0515 01:12:04.606180 1240 update_check_scheduler.cc:74] Next update check in 4m2s May 15 01:12:04.622138 env[1250]: time="2025-05-15T01:12:04.622115030Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 01:12:04.622225 env[1250]: time="2025-05-15T01:12:04.622200215Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.623854496Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.623878246Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.623999089Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.624009874Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.624016901Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.624022077Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.624064434Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.624190793Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.624257189Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 01:12:04.624378 env[1250]: time="2025-05-15T01:12:04.624266394Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 01:12:04.624550 env[1250]: time="2025-05-15T01:12:04.624292268Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 01:12:04.624550 env[1250]: time="2025-05-15T01:12:04.624299854Z" level=info msg="metadata content store policy set" policy=shared May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643701555Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643729840Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643738730Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643764998Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643776648Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643784238Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643791074Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643798555Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643806502Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643835638Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643848567Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643855921Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643933654Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 01:12:04.644764 env[1250]: time="2025-05-15T01:12:04.643980210Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644146192Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644162353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644169562Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644203286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644211492Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644219077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644225936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644232683Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644239402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644245591Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644283168Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644295540Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644369998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644384008Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645049 env[1250]: time="2025-05-15T01:12:04.644391634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645294 env[1250]: time="2025-05-15T01:12:04.644398086Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 01:12:04.645294 env[1250]: time="2025-05-15T01:12:04.644407037Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 01:12:04.645294 env[1250]: time="2025-05-15T01:12:04.644413351Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 01:12:04.645294 env[1250]: time="2025-05-15T01:12:04.644424068Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 01:12:04.645294 env[1250]: time="2025-05-15T01:12:04.644447041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 01:12:04.645376 env[1250]: time="2025-05-15T01:12:04.644560929Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 01:12:04.645376 env[1250]: time="2025-05-15T01:12:04.644592583Z" level=info msg="Connect containerd service" May 15 01:12:04.645376 env[1250]: time="2025-05-15T01:12:04.644609346Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.645590942Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.645733794Z" level=info msg="Start subscribing containerd event" May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.645753391Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.645771854Z" level=info msg="Start recovering state" May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.645777746Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.645806949Z" level=info msg="containerd successfully booted in 0.080540s" May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.646135429Z" level=info msg="Start event monitor" May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.646151732Z" level=info msg="Start snapshots syncer" May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.646161114Z" level=info msg="Start cni network conf syncer for default" May 15 01:12:04.647612 env[1250]: time="2025-05-15T01:12:04.646169482Z" level=info msg="Start streaming server" May 15 01:12:04.645881 systemd[1]: Started containerd.service. May 15 01:12:04.758071 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 01:12:04.758116 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 01:12:04.830397 sshd_keygen[1258]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 01:12:04.843842 systemd[1]: Finished sshd-keygen.service. May 15 01:12:04.844980 systemd[1]: Starting issuegen.service... May 15 01:12:04.848762 systemd[1]: issuegen.service: Deactivated successfully. May 15 01:12:04.848845 systemd[1]: Finished issuegen.service. May 15 01:12:04.849891 systemd[1]: Starting systemd-user-sessions.service... May 15 01:12:04.854863 systemd[1]: Finished systemd-user-sessions.service. May 15 01:12:04.855742 systemd[1]: Started getty@tty1.service. May 15 01:12:04.856516 systemd[1]: Started serial-getty@ttyS0.service. May 15 01:12:04.856722 systemd[1]: Reached target getty.target. May 15 01:12:04.886415 tar[1244]: linux-amd64/LICENSE May 15 01:12:04.886555 tar[1244]: linux-amd64/README.md May 15 01:12:04.889601 systemd[1]: Finished prepare-helm.service. May 15 01:13:25.736604 systemd-resolved[1196]: Clock change detected. Flushing caches. May 15 01:13:25.736831 systemd-timesyncd[1197]: Contacted time server 50.218.103.254:123 (0.flatcar.pool.ntp.org). May 15 01:13:25.737141 systemd-timesyncd[1197]: Initial clock synchronization to Thu 2025-05-15 01:13:25.736575 UTC. May 15 01:13:25.741764 locksmithd[1292]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 01:13:25.796856 systemd-networkd[1064]: ens192: Gained IPv6LL May 15 01:13:25.798152 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 01:13:25.798457 systemd[1]: Reached target network-online.target. May 15 01:13:25.799753 systemd[1]: Starting kubelet.service... May 15 01:13:26.543883 systemd[1]: Started kubelet.service. May 15 01:13:26.544206 systemd[1]: Reached target multi-user.target. May 15 01:13:26.545166 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 01:13:26.549611 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 01:13:26.549709 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 01:13:26.549926 systemd[1]: Startup finished in 894ms (kernel) + 5.248s (initrd) + 4.914s (userspace) = 11.057s. May 15 01:13:26.578902 login[1352]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 15 01:13:26.578988 login[1351]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 15 01:13:26.588673 systemd[1]: Created slice user-500.slice. May 15 01:13:26.589515 systemd[1]: Starting user-runtime-dir@500.service... May 15 01:13:26.592900 systemd-logind[1239]: New session 1 of user core. May 15 01:13:26.596054 systemd-logind[1239]: New session 2 of user core. May 15 01:13:26.598638 systemd[1]: Finished user-runtime-dir@500.service. May 15 01:13:26.599674 systemd[1]: Starting user@500.service... May 15 01:13:26.603142 (systemd)[1365]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 01:13:26.651977 systemd[1365]: Queued start job for default target default.target. May 15 01:13:26.652727 systemd[1365]: Reached target paths.target. May 15 01:13:26.652806 systemd[1365]: Reached target sockets.target. May 15 01:13:26.652913 systemd[1365]: Reached target timers.target. May 15 01:13:26.652972 systemd[1365]: Reached target basic.target. May 15 01:13:26.653072 systemd[1365]: Reached target default.target. May 15 01:13:26.653139 systemd[1365]: Startup finished in 45ms. May 15 01:13:26.653229 systemd[1]: Started user@500.service. May 15 01:13:26.654030 systemd[1]: Started session-1.scope. May 15 01:13:26.654592 systemd[1]: Started session-2.scope. May 15 01:13:27.122819 kubelet[1362]: E0515 01:13:27.122794 1362 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 01:13:27.124003 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 01:13:27.124083 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 01:13:37.374635 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 01:13:37.374793 systemd[1]: Stopped kubelet.service. May 15 01:13:37.375755 systemd[1]: Starting kubelet.service... May 15 01:13:37.428789 systemd[1]: Started kubelet.service. May 15 01:13:37.502502 kubelet[1395]: E0515 01:13:37.502466 1395 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 01:13:37.504699 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 01:13:37.504788 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 01:13:47.621999 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 01:13:47.622147 systemd[1]: Stopped kubelet.service. May 15 01:13:47.623369 systemd[1]: Starting kubelet.service... May 15 01:13:47.843385 systemd[1]: Started kubelet.service. May 15 01:13:47.908705 kubelet[1405]: E0515 01:13:47.908630 1405 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 01:13:47.910189 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 01:13:47.910283 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 01:13:55.483847 systemd[1]: Created slice system-sshd.slice. May 15 01:13:55.484896 systemd[1]: Started sshd@0-139.178.70.100:22-147.75.109.163:55388.service. May 15 01:13:55.530738 sshd[1412]: Accepted publickey for core from 147.75.109.163 port 55388 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:13:55.531593 sshd[1412]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:13:55.535335 systemd[1]: Started session-3.scope. May 15 01:13:55.535767 systemd-logind[1239]: New session 3 of user core. May 15 01:13:55.584704 systemd[1]: Started sshd@1-139.178.70.100:22-147.75.109.163:55398.service. May 15 01:13:55.618158 sshd[1417]: Accepted publickey for core from 147.75.109.163 port 55398 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:13:55.619001 sshd[1417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:13:55.622309 systemd[1]: Started session-4.scope. May 15 01:13:55.622501 systemd-logind[1239]: New session 4 of user core. May 15 01:13:55.673817 sshd[1417]: pam_unix(sshd:session): session closed for user core May 15 01:13:55.674924 systemd[1]: Started sshd@2-139.178.70.100:22-147.75.109.163:55410.service. May 15 01:13:55.676817 systemd[1]: sshd@1-139.178.70.100:22-147.75.109.163:55398.service: Deactivated successfully. May 15 01:13:55.677208 systemd[1]: session-4.scope: Deactivated successfully. May 15 01:13:55.677905 systemd-logind[1239]: Session 4 logged out. Waiting for processes to exit. May 15 01:13:55.678453 systemd-logind[1239]: Removed session 4. May 15 01:13:55.707911 sshd[1422]: Accepted publickey for core from 147.75.109.163 port 55410 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:13:55.708704 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:13:55.710909 systemd-logind[1239]: New session 5 of user core. May 15 01:13:55.711292 systemd[1]: Started session-5.scope. May 15 01:13:55.758140 sshd[1422]: pam_unix(sshd:session): session closed for user core May 15 01:13:55.760855 systemd[1]: Started sshd@3-139.178.70.100:22-147.75.109.163:55418.service. May 15 01:13:55.761222 systemd[1]: sshd@2-139.178.70.100:22-147.75.109.163:55410.service: Deactivated successfully. May 15 01:13:55.761708 systemd[1]: session-5.scope: Deactivated successfully. May 15 01:13:55.762569 systemd-logind[1239]: Session 5 logged out. Waiting for processes to exit. May 15 01:13:55.763478 systemd-logind[1239]: Removed session 5. May 15 01:13:55.798322 sshd[1428]: Accepted publickey for core from 147.75.109.163 port 55418 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:13:55.799215 sshd[1428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:13:55.802311 systemd-logind[1239]: New session 6 of user core. May 15 01:13:55.802820 systemd[1]: Started session-6.scope. May 15 01:13:55.854240 sshd[1428]: pam_unix(sshd:session): session closed for user core May 15 01:13:55.856691 systemd[1]: sshd@3-139.178.70.100:22-147.75.109.163:55418.service: Deactivated successfully. May 15 01:13:55.857112 systemd[1]: session-6.scope: Deactivated successfully. May 15 01:13:55.857672 systemd-logind[1239]: Session 6 logged out. Waiting for processes to exit. May 15 01:13:55.858393 systemd[1]: Started sshd@4-139.178.70.100:22-147.75.109.163:55420.service. May 15 01:13:55.859329 systemd-logind[1239]: Removed session 6. May 15 01:13:55.894245 sshd[1435]: Accepted publickey for core from 147.75.109.163 port 55420 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:13:55.895087 sshd[1435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:13:55.898166 systemd-logind[1239]: New session 7 of user core. May 15 01:13:55.898655 systemd[1]: Started session-7.scope. May 15 01:13:55.959563 sudo[1438]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 01:13:55.959758 sudo[1438]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 01:13:55.967964 dbus-daemon[1231]: н[e5V: received setenforce notice (enforcing=-1166565728) May 15 01:13:55.968076 sudo[1438]: pam_unix(sudo:session): session closed for user root May 15 01:13:55.969806 sshd[1435]: pam_unix(sshd:session): session closed for user core May 15 01:13:55.972393 systemd[1]: Started sshd@5-139.178.70.100:22-147.75.109.163:55422.service. May 15 01:13:55.972785 systemd[1]: sshd@4-139.178.70.100:22-147.75.109.163:55420.service: Deactivated successfully. May 15 01:13:55.973265 systemd[1]: session-7.scope: Deactivated successfully. May 15 01:13:55.974262 systemd-logind[1239]: Session 7 logged out. Waiting for processes to exit. May 15 01:13:55.975236 systemd-logind[1239]: Removed session 7. May 15 01:13:56.009663 sshd[1441]: Accepted publickey for core from 147.75.109.163 port 55422 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:13:56.010597 sshd[1441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:13:56.014107 systemd[1]: Started session-8.scope. May 15 01:13:56.014443 systemd-logind[1239]: New session 8 of user core. May 15 01:13:56.064542 sudo[1446]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 01:13:56.064738 sudo[1446]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 01:13:56.066611 sudo[1446]: pam_unix(sudo:session): session closed for user root May 15 01:13:56.070014 sudo[1445]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 01:13:56.070333 sudo[1445]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 01:13:56.077050 systemd[1]: Stopping audit-rules.service... May 15 01:13:56.077000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 01:13:56.079025 kernel: kauditd_printk_skb: 289 callbacks suppressed May 15 01:13:56.079065 kernel: audit: type=1305 audit(1747271636.077:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 01:13:56.077000 audit[1449]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0974fb90 a2=420 a3=0 items=0 ppid=1 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.085981 kernel: audit: type=1300 audit(1747271636.077:210): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0974fb90 a2=420 a3=0 items=0 ppid=1 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.086019 kernel: audit: type=1327 audit(1747271636.077:210): proctitle=2F7362696E2F617564697463746C002D44 May 15 01:13:56.077000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 01:13:56.086067 auditctl[1449]: No rules May 15 01:13:56.086349 systemd[1]: audit-rules.service: Deactivated successfully. May 15 01:13:56.086472 systemd[1]: Stopped audit-rules.service. May 15 01:13:56.087694 systemd[1]: Starting audit-rules.service... May 15 01:13:56.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:56.091747 kernel: audit: type=1131 audit(1747271636.085:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:56.098925 augenrules[1466]: No rules May 15 01:13:56.103896 kernel: audit: type=1130 audit(1747271636.098:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:56.103932 kernel: audit: type=1106 audit(1747271636.099:213): pid=1445 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:13:56.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:56.099000 audit[1445]: USER_END pid=1445 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:13:56.099857 sudo[1445]: pam_unix(sudo:session): session closed for user root May 15 01:13:56.099309 systemd[1]: Finished audit-rules.service. May 15 01:13:56.101084 sshd[1441]: pam_unix(sshd:session): session closed for user core May 15 01:13:56.099000 audit[1445]: CRED_DISP pid=1445 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:13:56.108085 systemd[1]: Started sshd@6-139.178.70.100:22-147.75.109.163:55426.service. May 15 01:13:56.109249 kernel: audit: type=1104 audit(1747271636.099:214): pid=1445 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:13:56.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:55426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:56.112079 kernel: audit: type=1130 audit(1747271636.106:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:55426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:56.111000 audit[1441]: USER_END pid=1441 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:13:56.112807 systemd[1]: sshd@5-139.178.70.100:22-147.75.109.163:55422.service: Deactivated successfully. May 15 01:13:56.113137 systemd[1]: session-8.scope: Deactivated successfully. May 15 01:13:56.115751 systemd-logind[1239]: Session 8 logged out. Waiting for processes to exit. May 15 01:13:56.116188 kernel: audit: type=1106 audit(1747271636.111:216): pid=1441 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:13:56.116212 kernel: audit: type=1104 audit(1747271636.111:217): pid=1441 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:13:56.111000 audit[1441]: CRED_DISP pid=1441 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:13:56.116326 systemd-logind[1239]: Removed session 8. May 15 01:13:56.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.100:22-147.75.109.163:55422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:56.145000 audit[1471]: USER_ACCT pid=1471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:13:56.145977 sshd[1471]: Accepted publickey for core from 147.75.109.163 port 55426 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:13:56.145000 audit[1471]: CRED_ACQ pid=1471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:13:56.145000 audit[1471]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef0956de0 a2=3 a3=0 items=0 ppid=1 pid=1471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:13:56.146747 sshd[1471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:13:56.149879 systemd[1]: Started session-9.scope. May 15 01:13:56.150126 systemd-logind[1239]: New session 9 of user core. May 15 01:13:56.152000 audit[1471]: USER_START pid=1471 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:13:56.153000 audit[1474]: CRED_ACQ pid=1474 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:13:56.199000 audit[1475]: USER_ACCT pid=1475 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:13:56.199000 audit[1475]: CRED_REFR pid=1475 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:13:56.200614 sudo[1475]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 01:13:56.201027 sudo[1475]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 01:13:56.201000 audit[1475]: USER_START pid=1475 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:13:56.217681 systemd[1]: Starting docker.service... May 15 01:13:56.240368 env[1485]: time="2025-05-15T01:13:56.240339577Z" level=info msg="Starting up" May 15 01:13:56.241050 env[1485]: time="2025-05-15T01:13:56.241037010Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 01:13:56.241050 env[1485]: time="2025-05-15T01:13:56.241047139Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 01:13:56.241111 env[1485]: time="2025-05-15T01:13:56.241057933Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 01:13:56.241111 env[1485]: time="2025-05-15T01:13:56.241064297Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 01:13:56.242011 env[1485]: time="2025-05-15T01:13:56.242001015Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 01:13:56.242060 env[1485]: time="2025-05-15T01:13:56.242050531Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 01:13:56.242110 env[1485]: time="2025-05-15T01:13:56.242100210Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 01:13:56.242149 env[1485]: time="2025-05-15T01:13:56.242140510Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 01:13:56.245739 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1325044257-merged.mount: Deactivated successfully. May 15 01:13:56.257964 env[1485]: time="2025-05-15T01:13:56.257951338Z" level=info msg="Loading containers: start." May 15 01:13:56.297000 audit[1516]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.297000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff264ebc40 a2=0 a3=7fff264ebc2c items=0 ppid=1485 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 01:13:56.298000 audit[1518]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1518 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.298000 audit[1518]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc78901ee0 a2=0 a3=7ffc78901ecc items=0 ppid=1485 pid=1518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.298000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 01:13:56.299000 audit[1520]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.299000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc9faedf0 a2=0 a3=7ffcc9faeddc items=0 ppid=1485 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.299000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 01:13:56.300000 audit[1522]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.300000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc623a5b00 a2=0 a3=7ffc623a5aec items=0 ppid=1485 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 01:13:56.302000 audit[1524]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.302000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0b563110 a2=0 a3=7ffe0b5630fc items=0 ppid=1485 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 01:13:56.315000 audit[1529]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.315000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe078b5d10 a2=0 a3=7ffe078b5cfc items=0 ppid=1485 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.315000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 01:13:56.318000 audit[1531]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.318000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca84e91f0 a2=0 a3=7ffca84e91dc items=0 ppid=1485 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 01:13:56.319000 audit[1533]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.319000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffebd8d8630 a2=0 a3=7ffebd8d861c items=0 ppid=1485 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 01:13:56.320000 audit[1535]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.320000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe17652360 a2=0 a3=7ffe1765234c items=0 ppid=1485 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 01:13:56.324000 audit[1539]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.324000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff1bffc870 a2=0 a3=7fff1bffc85c items=0 ppid=1485 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 01:13:56.329000 audit[1540]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.329000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd5cf95b50 a2=0 a3=7ffd5cf95b3c items=0 ppid=1485 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 01:13:56.338731 kernel: Initializing XFRM netlink socket May 15 01:13:56.360952 env[1485]: time="2025-05-15T01:13:56.360937412Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 01:13:56.373000 audit[1548]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.373000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdc400b220 a2=0 a3=7ffdc400b20c items=0 ppid=1485 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.373000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 01:13:56.382000 audit[1551]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.382000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffecc2e2a20 a2=0 a3=7ffecc2e2a0c items=0 ppid=1485 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.382000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 01:13:56.384000 audit[1554]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1554 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.384000 audit[1554]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff9c7b35c0 a2=0 a3=7fff9c7b35ac items=0 ppid=1485 pid=1554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.384000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 01:13:56.385000 audit[1556]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.385000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffee4f11060 a2=0 a3=7ffee4f1104c items=0 ppid=1485 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.385000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 01:13:56.386000 audit[1558]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.386000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff468a3c20 a2=0 a3=7fff468a3c0c items=0 ppid=1485 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.386000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 01:13:56.388000 audit[1560]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1560 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.388000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc37e9ace0 a2=0 a3=7ffc37e9accc items=0 ppid=1485 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.388000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 01:13:56.389000 audit[1562]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.389000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd7db52890 a2=0 a3=7ffd7db5287c items=0 ppid=1485 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.389000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 01:13:56.395000 audit[1565]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.395000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcb5a78a70 a2=0 a3=7ffcb5a78a5c items=0 ppid=1485 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 01:13:56.396000 audit[1567]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.396000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd1be19500 a2=0 a3=7ffd1be194ec items=0 ppid=1485 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 01:13:56.397000 audit[1569]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.397000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc18483990 a2=0 a3=7ffc1848397c items=0 ppid=1485 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 01:13:56.398000 audit[1571]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.398000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffca30a6f00 a2=0 a3=7ffca30a6eec items=0 ppid=1485 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 01:13:56.400017 systemd-networkd[1064]: docker0: Link UP May 15 01:13:56.403000 audit[1575]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.403000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed6b1ac10 a2=0 a3=7ffed6b1abfc items=0 ppid=1485 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.403000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 01:13:56.407000 audit[1576]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:13:56.407000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffde71bd840 a2=0 a3=7ffde71bd82c items=0 ppid=1485 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:13:56.407000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 01:13:56.408510 env[1485]: time="2025-05-15T01:13:56.408492105Z" level=info msg="Loading containers: done." May 15 01:13:56.414141 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1997323240-merged.mount: Deactivated successfully. May 15 01:13:56.419258 env[1485]: time="2025-05-15T01:13:56.419237599Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 01:13:56.419348 env[1485]: time="2025-05-15T01:13:56.419333555Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 01:13:56.419397 env[1485]: time="2025-05-15T01:13:56.419386018Z" level=info msg="Daemon has completed initialization" May 15 01:13:56.425765 systemd[1]: Started docker.service. May 15 01:13:56.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:56.431720 env[1485]: time="2025-05-15T01:13:56.431691462Z" level=info msg="API listen on /run/docker.sock" May 15 01:13:57.353205 env[1250]: time="2025-05-15T01:13:57.353163659Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 15 01:13:57.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:57.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:57.944260 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 15 01:13:57.944362 systemd[1]: Stopped kubelet.service. May 15 01:13:57.945443 systemd[1]: Starting kubelet.service... May 15 01:13:57.950296 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount327120318.mount: Deactivated successfully. May 15 01:13:58.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:13:58.011379 systemd[1]: Started kubelet.service. May 15 01:13:58.072431 kubelet[1620]: E0515 01:13:58.072408 1620 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 01:13:58.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 01:13:58.073582 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 01:13:58.073659 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 01:13:59.440910 env[1250]: time="2025-05-15T01:13:59.440883204Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:13:59.441679 env[1250]: time="2025-05-15T01:13:59.441666364Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:13:59.442638 env[1250]: time="2025-05-15T01:13:59.442627020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:13:59.443667 env[1250]: time="2025-05-15T01:13:59.443655743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:13:59.444130 env[1250]: time="2025-05-15T01:13:59.444112263Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 15 01:13:59.449488 env[1250]: time="2025-05-15T01:13:59.449464241Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 15 01:14:01.320796 env[1250]: time="2025-05-15T01:14:01.320756425Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:01.334486 env[1250]: time="2025-05-15T01:14:01.334454731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:01.339996 env[1250]: time="2025-05-15T01:14:01.339971522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:01.347074 env[1250]: time="2025-05-15T01:14:01.347046309Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:01.347687 env[1250]: time="2025-05-15T01:14:01.347662332Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 15 01:14:01.356557 env[1250]: time="2025-05-15T01:14:01.356527717Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 15 01:14:02.459808 env[1250]: time="2025-05-15T01:14:02.459776617Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:02.460576 env[1250]: time="2025-05-15T01:14:02.460563731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:02.461598 env[1250]: time="2025-05-15T01:14:02.461582152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:02.462631 env[1250]: time="2025-05-15T01:14:02.462616378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:02.463136 env[1250]: time="2025-05-15T01:14:02.463121557Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 15 01:14:02.468243 env[1250]: time="2025-05-15T01:14:02.468221881Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 15 01:14:03.583506 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount635287114.mount: Deactivated successfully. May 15 01:14:04.020692 env[1250]: time="2025-05-15T01:14:04.020652009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:04.034159 env[1250]: time="2025-05-15T01:14:04.034134300Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:04.042372 env[1250]: time="2025-05-15T01:14:04.042346871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:04.047563 env[1250]: time="2025-05-15T01:14:04.047535334Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:04.047732 env[1250]: time="2025-05-15T01:14:04.047698585Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 15 01:14:04.054291 env[1250]: time="2025-05-15T01:14:04.054271210Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 01:14:04.525570 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount56668011.mount: Deactivated successfully. May 15 01:14:05.288030 env[1250]: time="2025-05-15T01:14:05.287999008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:05.288736 env[1250]: time="2025-05-15T01:14:05.288708429Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:05.289666 env[1250]: time="2025-05-15T01:14:05.289651993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:05.292223 env[1250]: time="2025-05-15T01:14:05.292205125Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 01:14:05.292485 env[1250]: time="2025-05-15T01:14:05.292430772Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:05.298577 env[1250]: time="2025-05-15T01:14:05.298559764Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 15 01:14:05.710551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3744947572.mount: Deactivated successfully. May 15 01:14:05.712650 env[1250]: time="2025-05-15T01:14:05.712623984Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:05.713235 env[1250]: time="2025-05-15T01:14:05.713219315Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:05.713924 env[1250]: time="2025-05-15T01:14:05.713911215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:05.714618 env[1250]: time="2025-05-15T01:14:05.714603179Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:05.715021 env[1250]: time="2025-05-15T01:14:05.715004398Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 15 01:14:05.720290 env[1250]: time="2025-05-15T01:14:05.720275066Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 15 01:14:06.446266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3357970432.mount: Deactivated successfully. May 15 01:14:08.121751 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 15 01:14:08.121874 systemd[1]: Stopped kubelet.service. May 15 01:14:08.122955 systemd[1]: Starting kubelet.service... May 15 01:14:08.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:08.123734 kernel: kauditd_printk_skb: 88 callbacks suppressed May 15 01:14:08.123770 kernel: audit: type=1130 audit(1747271648.121:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:08.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:08.128722 kernel: audit: type=1131 audit(1747271648.121:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:09.134631 env[1250]: time="2025-05-15T01:14:09.134535442Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:09.203285 env[1250]: time="2025-05-15T01:14:09.203237329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:09.233705 env[1250]: time="2025-05-15T01:14:09.233654929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:09.276269 env[1250]: time="2025-05-15T01:14:09.276083358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:09.295568 env[1250]: time="2025-05-15T01:14:09.276284564Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 15 01:14:10.456874 systemd[1]: Started kubelet.service. May 15 01:14:10.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:10.459726 kernel: audit: type=1130 audit(1747271650.456:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:10.506000 update_engine[1240]: I0515 01:14:10.505673 1240 update_attempter.cc:509] Updating boot flags... May 15 01:14:10.516988 kubelet[1725]: E0515 01:14:10.516969 1725 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 01:14:10.518012 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 01:14:10.518087 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 01:14:10.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 01:14:10.521728 kernel: audit: type=1131 audit(1747271650.517:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 01:14:11.830596 systemd[1]: Stopped kubelet.service. May 15 01:14:11.833928 kernel: audit: type=1130 audit(1747271651.830:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:11.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:11.833620 systemd[1]: Starting kubelet.service... May 15 01:14:11.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:11.837727 kernel: audit: type=1131 audit(1747271651.830:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:11.865560 systemd[1]: Reloading. May 15 01:14:11.936841 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2025-05-15T01:14:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 01:14:11.937045 /usr/lib/systemd/system-generators/torcx-generator[1774]: time="2025-05-15T01:14:11Z" level=info msg="torcx already run" May 15 01:14:11.962273 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 01:14:11.962284 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 01:14:11.974097 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 01:14:12.027789 kernel: audit: type=1400 audit(1747271652.022:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027853 kernel: audit: type=1400 audit(1747271652.022:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.030317 kernel: audit: type=1400 audit(1747271652.024:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032763 kernel: audit: type=1400 audit(1747271652.024:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit: BPF prog-id=43 op=LOAD May 15 01:14:12.027000 audit: BPF prog-id=27 op=UNLOAD May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit: BPF prog-id=44 op=LOAD May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit: BPF prog-id=45 op=LOAD May 15 01:14:12.027000 audit: BPF prog-id=28 op=UNLOAD May 15 01:14:12.027000 audit: BPF prog-id=29 op=UNLOAD May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit: BPF prog-id=46 op=LOAD May 15 01:14:12.032000 audit: BPF prog-id=41 op=UNLOAD May 15 01:14:12.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit: BPF prog-id=47 op=LOAD May 15 01:14:12.033000 audit: BPF prog-id=38 op=UNLOAD May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit: BPF prog-id=48 op=LOAD May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit: BPF prog-id=49 op=LOAD May 15 01:14:12.033000 audit: BPF prog-id=39 op=UNLOAD May 15 01:14:12.033000 audit: BPF prog-id=40 op=UNLOAD May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit: BPF prog-id=50 op=LOAD May 15 01:14:12.033000 audit: BPF prog-id=30 op=UNLOAD May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit: BPF prog-id=51 op=LOAD May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.033000 audit: BPF prog-id=52 op=LOAD May 15 01:14:12.033000 audit: BPF prog-id=31 op=UNLOAD May 15 01:14:12.033000 audit: BPF prog-id=32 op=UNLOAD May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit: BPF prog-id=53 op=LOAD May 15 01:14:12.034000 audit: BPF prog-id=33 op=UNLOAD May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.034000 audit: BPF prog-id=54 op=LOAD May 15 01:14:12.034000 audit: BPF prog-id=37 op=UNLOAD May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit: BPF prog-id=55 op=LOAD May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit: BPF prog-id=56 op=LOAD May 15 01:14:12.036000 audit: BPF prog-id=34 op=UNLOAD May 15 01:14:12.036000 audit: BPF prog-id=35 op=UNLOAD May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:12.036000 audit: BPF prog-id=57 op=LOAD May 15 01:14:12.036000 audit: BPF prog-id=36 op=UNLOAD May 15 01:14:12.074275 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 15 01:14:12.074325 systemd[1]: kubelet.service: Failed with result 'signal'. May 15 01:14:12.074451 systemd[1]: Stopped kubelet.service. May 15 01:14:12.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 01:14:12.075605 systemd[1]: Starting kubelet.service... May 15 01:14:12.869045 systemd[1]: Started kubelet.service. May 15 01:14:12.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:12.899338 kubelet[1838]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 01:14:12.899338 kubelet[1838]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 01:14:12.899338 kubelet[1838]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 01:14:12.899598 kubelet[1838]: I0515 01:14:12.899364 1838 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 01:14:13.172746 kubelet[1838]: I0515 01:14:13.172721 1838 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 01:14:13.172746 kubelet[1838]: I0515 01:14:13.172740 1838 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 01:14:13.172910 kubelet[1838]: I0515 01:14:13.172897 1838 server.go:927] "Client rotation is on, will bootstrap in background" May 15 01:14:13.290774 kubelet[1838]: I0515 01:14:13.290747 1838 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 01:14:13.292893 kubelet[1838]: E0515 01:14:13.292205 1838 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.100:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.301399 kubelet[1838]: I0515 01:14:13.301383 1838 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 01:14:13.301660 kubelet[1838]: I0515 01:14:13.301635 1838 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 01:14:13.301834 kubelet[1838]: I0515 01:14:13.301705 1838 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 01:14:13.302561 kubelet[1838]: I0515 01:14:13.302542 1838 topology_manager.go:138] "Creating topology manager with none policy" May 15 01:14:13.302613 kubelet[1838]: I0515 01:14:13.302606 1838 container_manager_linux.go:301] "Creating device plugin manager" May 15 01:14:13.302754 kubelet[1838]: I0515 01:14:13.302747 1838 state_mem.go:36] "Initialized new in-memory state store" May 15 01:14:13.303863 kubelet[1838]: W0515 01:14:13.303837 1838 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.303935 kubelet[1838]: E0515 01:14:13.303927 1838 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.303982 kubelet[1838]: I0515 01:14:13.303570 1838 kubelet.go:400] "Attempting to sync node with API server" May 15 01:14:13.304028 kubelet[1838]: I0515 01:14:13.304021 1838 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 01:14:13.304091 kubelet[1838]: I0515 01:14:13.304086 1838 kubelet.go:312] "Adding apiserver pod source" May 15 01:14:13.305619 kubelet[1838]: I0515 01:14:13.305607 1838 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 01:14:13.321509 kubelet[1838]: W0515 01:14:13.321477 1838 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.321625 kubelet[1838]: E0515 01:14:13.321616 1838 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.336975 kubelet[1838]: I0515 01:14:13.336960 1838 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 01:14:13.340344 kubelet[1838]: I0515 01:14:13.340335 1838 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 01:14:13.340444 kubelet[1838]: W0515 01:14:13.340436 1838 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 01:14:13.340849 kubelet[1838]: I0515 01:14:13.340842 1838 server.go:1264] "Started kubelet" May 15 01:14:13.349855 kubelet[1838]: E0515 01:14:13.349764 1838 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.100:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183f8e4faf7d50df default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 01:14:13.340827871 +0000 UTC m=+0.467228596,LastTimestamp:2025-05-15 01:14:13.340827871 +0000 UTC m=+0.467228596,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 01:14:13.350094 kubelet[1838]: I0515 01:14:13.350075 1838 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 01:14:13.351076 kubelet[1838]: I0515 01:14:13.351068 1838 server.go:455] "Adding debug handlers to kubelet server" May 15 01:14:13.351152 kubelet[1838]: I0515 01:14:13.351122 1838 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 01:14:13.351360 kubelet[1838]: I0515 01:14:13.351348 1838 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 01:14:13.357817 kernel: kauditd_printk_skb: 170 callbacks suppressed May 15 01:14:13.357896 kernel: audit: type=1400 audit(1747271653.352:436): avc: denied { mac_admin } for pid=1838 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:13.357916 kernel: audit: type=1401 audit(1747271653.352:436): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 01:14:13.352000 audit[1838]: AVC avc: denied { mac_admin } for pid=1838 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:13.352000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 01:14:13.358018 kubelet[1838]: E0515 01:14:13.355609 1838 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 01:14:13.352000 audit[1838]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a335c0 a1=c000c4e6c0 a2=c000a33590 a3=25 items=0 ppid=1 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.362168 kernel: audit: type=1300 audit(1747271653.352:436): arch=c000003e syscall=188 success=no exit=-22 a0=c000a335c0 a1=c000c4e6c0 a2=c000a33590 a3=25 items=0 ppid=1 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 01:14:13.362330 kubelet[1838]: I0515 01:14:13.362315 1838 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 01:14:13.362412 kubelet[1838]: I0515 01:14:13.362400 1838 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 01:14:13.362515 kubelet[1838]: I0515 01:14:13.362509 1838 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 01:14:13.365837 kernel: audit: type=1327 audit(1747271653.352:436): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 01:14:13.365902 kernel: audit: type=1400 audit(1747271653.361:437): avc: denied { mac_admin } for pid=1838 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:13.361000 audit[1838]: AVC avc: denied { mac_admin } for pid=1838 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:13.368318 kubelet[1838]: I0515 01:14:13.368299 1838 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 01:14:13.361000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 01:14:13.369948 kernel: audit: type=1401 audit(1747271653.361:437): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 01:14:13.361000 audit[1838]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a1d420 a1=c000c4e768 a2=c000a336e0 a3=25 items=0 ppid=1 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.371610 kubelet[1838]: I0515 01:14:13.371599 1838 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 01:14:13.371707 kubelet[1838]: I0515 01:14:13.371700 1838 reconciler.go:26] "Reconciler: start to sync state" May 15 01:14:13.373851 kernel: audit: type=1300 audit(1747271653.361:437): arch=c000003e syscall=188 success=no exit=-22 a0=c000a1d420 a1=c000c4e768 a2=c000a336e0 a3=25 items=0 ppid=1 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.361000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 01:14:13.377482 kernel: audit: type=1327 audit(1747271653.361:437): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 01:14:13.378116 kubelet[1838]: E0515 01:14:13.378078 1838 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="200ms" May 15 01:14:13.361000 audit[1850]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.379802 kubelet[1838]: W0515 01:14:13.378805 1838 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.379802 kubelet[1838]: E0515 01:14:13.378831 1838 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.361000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffad2fcaa0 a2=0 a3=7fffad2fca8c items=0 ppid=1838 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.380745 kubelet[1838]: I0515 01:14:13.380734 1838 factory.go:221] Registration of the containerd container factory successfully May 15 01:14:13.380795 kubelet[1838]: I0515 01:14:13.380788 1838 factory.go:221] Registration of the systemd container factory successfully May 15 01:14:13.380871 kubelet[1838]: I0515 01:14:13.380861 1838 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 01:14:13.384212 kernel: audit: type=1325 audit(1747271653.361:438): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.384257 kernel: audit: type=1300 audit(1747271653.361:438): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffad2fcaa0 a2=0 a3=7fffad2fca8c items=0 ppid=1838 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 01:14:13.361000 audit[1851]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.361000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0b3b5ed0 a2=0 a3=7ffe0b3b5ebc items=0 ppid=1838 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 01:14:13.369000 audit[1853]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.369000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcfc11f3a0 a2=0 a3=7ffcfc11f38c items=0 ppid=1838 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 01:14:13.369000 audit[1855]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.369000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc3a5d63f0 a2=0 a3=7ffc3a5d63dc items=0 ppid=1838 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 01:14:13.393034 kubelet[1838]: I0515 01:14:13.393012 1838 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 01:14:13.393034 kubelet[1838]: I0515 01:14:13.393033 1838 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 01:14:13.393147 kubelet[1838]: I0515 01:14:13.393044 1838 state_mem.go:36] "Initialized new in-memory state store" May 15 01:14:13.399519 kubelet[1838]: I0515 01:14:13.399499 1838 policy_none.go:49] "None policy: Start" May 15 01:14:13.399955 kubelet[1838]: I0515 01:14:13.399947 1838 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 01:14:13.400023 kubelet[1838]: I0515 01:14:13.400017 1838 state_mem.go:35] "Initializing new in-memory state store" May 15 01:14:13.400000 audit[1859]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.400000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe696297d0 a2=0 a3=7ffe696297bc items=0 ppid=1838 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 01:14:13.401352 kubelet[1838]: I0515 01:14:13.401332 1838 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 01:14:13.402051 kubelet[1838]: I0515 01:14:13.402038 1838 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 01:14:13.402051 kubelet[1838]: I0515 01:14:13.402050 1838 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 01:14:13.402107 kubelet[1838]: I0515 01:14:13.402061 1838 kubelet.go:2337] "Starting kubelet main sync loop" May 15 01:14:13.402107 kubelet[1838]: E0515 01:14:13.402083 1838 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 01:14:13.401000 audit[1860]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:13.401000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4d0194f0 a2=0 a3=7ffc4d0194dc items=0 ppid=1838 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 01:14:13.401000 audit[1861]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.401000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff82dfc840 a2=0 a3=10e3 items=0 ppid=1838 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 01:14:13.403160 kubelet[1838]: W0515 01:14:13.402958 1838 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.403160 kubelet[1838]: E0515 01:14:13.402976 1838 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:13.402000 audit[1862]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:13.402000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc641b6580 a2=0 a3=7ffc641b656c items=0 ppid=1838 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 01:14:13.403000 audit[1864]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.403000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcca2bf770 a2=0 a3=7ffcca2bf75c items=0 ppid=1838 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 01:14:13.403000 audit[1865]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:13.403000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffdc757e30 a2=0 a3=7fffdc757e1c items=0 ppid=1838 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 01:14:13.404000 audit[1866]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:13.404000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc16b9b3c0 a2=0 a3=7ffc16b9b3ac items=0 ppid=1838 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 01:14:13.404000 audit[1867]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:13.404000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc98d50050 a2=0 a3=7ffc98d5003c items=0 ppid=1838 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 01:14:13.409805 systemd[1]: Created slice kubepods.slice. May 15 01:14:13.412777 systemd[1]: Created slice kubepods-besteffort.slice. May 15 01:14:13.418262 systemd[1]: Created slice kubepods-burstable.slice. May 15 01:14:13.419191 kubelet[1838]: I0515 01:14:13.419172 1838 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 01:14:13.418000 audit[1838]: AVC avc: denied { mac_admin } for pid=1838 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:13.418000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 01:14:13.418000 audit[1838]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c69230 a1=c000e08ab0 a2=c000c69200 a3=25 items=0 ppid=1 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:13.418000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 01:14:13.419366 kubelet[1838]: I0515 01:14:13.419228 1838 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 01:14:13.419366 kubelet[1838]: I0515 01:14:13.419309 1838 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 01:14:13.419406 kubelet[1838]: I0515 01:14:13.419379 1838 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 01:14:13.420890 kubelet[1838]: E0515 01:14:13.420846 1838 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 01:14:13.472747 kubelet[1838]: I0515 01:14:13.469679 1838 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 01:14:13.472747 kubelet[1838]: E0515 01:14:13.469989 1838 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 15 01:14:13.502276 kubelet[1838]: I0515 01:14:13.502217 1838 topology_manager.go:215] "Topology Admit Handler" podUID="ba7c34f6d676973cf436b49c7b3c1cbe" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 01:14:13.503342 kubelet[1838]: I0515 01:14:13.503311 1838 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 01:14:13.504113 kubelet[1838]: I0515 01:14:13.504091 1838 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 01:14:13.508245 systemd[1]: Created slice kubepods-burstable-podba7c34f6d676973cf436b49c7b3c1cbe.slice. May 15 01:14:13.525506 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 15 01:14:13.528546 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 15 01:14:13.578719 kubelet[1838]: E0515 01:14:13.578670 1838 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="400ms" May 15 01:14:13.671687 kubelet[1838]: I0515 01:14:13.671666 1838 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 01:14:13.671910 kubelet[1838]: E0515 01:14:13.671894 1838 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 15 01:14:13.673038 kubelet[1838]: I0515 01:14:13.673025 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ba7c34f6d676973cf436b49c7b3c1cbe-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"ba7c34f6d676973cf436b49c7b3c1cbe\") " pod="kube-system/kube-apiserver-localhost" May 15 01:14:13.673069 kubelet[1838]: I0515 01:14:13.673053 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ba7c34f6d676973cf436b49c7b3c1cbe-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"ba7c34f6d676973cf436b49c7b3c1cbe\") " pod="kube-system/kube-apiserver-localhost" May 15 01:14:13.673094 kubelet[1838]: I0515 01:14:13.673068 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:13.673094 kubelet[1838]: I0515 01:14:13.673077 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:13.673094 kubelet[1838]: I0515 01:14:13.673087 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 01:14:13.673151 kubelet[1838]: I0515 01:14:13.673095 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ba7c34f6d676973cf436b49c7b3c1cbe-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"ba7c34f6d676973cf436b49c7b3c1cbe\") " pod="kube-system/kube-apiserver-localhost" May 15 01:14:13.673151 kubelet[1838]: I0515 01:14:13.673104 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:13.673151 kubelet[1838]: I0515 01:14:13.673129 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:13.673224 kubelet[1838]: I0515 01:14:13.673154 1838 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:13.690353 kubelet[1838]: E0515 01:14:13.690284 1838 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.100:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.100:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183f8e4faf7d50df default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 01:14:13.340827871 +0000 UTC m=+0.467228596,LastTimestamp:2025-05-15 01:14:13.340827871 +0000 UTC m=+0.467228596,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 01:14:13.825239 env[1250]: time="2025-05-15T01:14:13.824838815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:ba7c34f6d676973cf436b49c7b3c1cbe,Namespace:kube-system,Attempt:0,}" May 15 01:14:13.827775 env[1250]: time="2025-05-15T01:14:13.827457338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 15 01:14:13.831897 env[1250]: time="2025-05-15T01:14:13.831681468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 15 01:14:13.979522 kubelet[1838]: E0515 01:14:13.979470 1838 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="800ms" May 15 01:14:14.073407 kubelet[1838]: I0515 01:14:14.073385 1838 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 01:14:14.073569 kubelet[1838]: E0515 01:14:14.073553 1838 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 15 01:14:14.124049 kubelet[1838]: W0515 01:14:14.124007 1838 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:14.124049 kubelet[1838]: E0515 01:14:14.124050 1838 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.100:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:14.320315 kubelet[1838]: W0515 01:14:14.320270 1838 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:14.320315 kubelet[1838]: E0515 01:14:14.320312 1838 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.100:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:14.348491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount474030082.mount: Deactivated successfully. May 15 01:14:14.351242 env[1250]: time="2025-05-15T01:14:14.351156459Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.351754 env[1250]: time="2025-05-15T01:14:14.351733089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.352521 env[1250]: time="2025-05-15T01:14:14.352503403Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.353519 env[1250]: time="2025-05-15T01:14:14.353506190Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.354392 env[1250]: time="2025-05-15T01:14:14.354376786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.356428 env[1250]: time="2025-05-15T01:14:14.356415915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.358370 env[1250]: time="2025-05-15T01:14:14.358351820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.359038 env[1250]: time="2025-05-15T01:14:14.359022048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.360017 env[1250]: time="2025-05-15T01:14:14.360001025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.360442 env[1250]: time="2025-05-15T01:14:14.360425597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.360832 env[1250]: time="2025-05-15T01:14:14.360814915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.361286 env[1250]: time="2025-05-15T01:14:14.361240110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:14.382667 env[1250]: time="2025-05-15T01:14:14.373400239Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:14:14.382667 env[1250]: time="2025-05-15T01:14:14.373417760Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:14:14.382667 env[1250]: time="2025-05-15T01:14:14.373424759Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:14:14.382667 env[1250]: time="2025-05-15T01:14:14.373516328Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3db079dd600a7cbc5d98cc353a6a08a7866017179fbefd5479ee2fc6aa54b21 pid=1892 runtime=io.containerd.runc.v2 May 15 01:14:14.382886 env[1250]: time="2025-05-15T01:14:14.370401010Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:14:14.382886 env[1250]: time="2025-05-15T01:14:14.370421931Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:14:14.382886 env[1250]: time="2025-05-15T01:14:14.370448149Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:14:14.382886 env[1250]: time="2025-05-15T01:14:14.370533703Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e41e901f6ad1f4a7efb3cc1fe726338f1a4ce340aee56390c512cc8c51a0bb9 pid=1875 runtime=io.containerd.runc.v2 May 15 01:14:14.397261 env[1250]: time="2025-05-15T01:14:14.397218090Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:14:14.397463 env[1250]: time="2025-05-15T01:14:14.397268012Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:14:14.397463 env[1250]: time="2025-05-15T01:14:14.397283445Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:14:14.397463 env[1250]: time="2025-05-15T01:14:14.397356632Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab307359166c3deb989e10b8aa784914af4ad8f17eae5d81412ba46e79b4b0f4 pid=1918 runtime=io.containerd.runc.v2 May 15 01:14:14.400197 systemd[1]: Started cri-containerd-a3db079dd600a7cbc5d98cc353a6a08a7866017179fbefd5479ee2fc6aa54b21.scope. May 15 01:14:14.411779 systemd[1]: Started cri-containerd-5e41e901f6ad1f4a7efb3cc1fe726338f1a4ce340aee56390c512cc8c51a0bb9.scope. May 15 01:14:14.420898 systemd[1]: Started cri-containerd-ab307359166c3deb989e10b8aa784914af4ad8f17eae5d81412ba46e79b4b0f4.scope. May 15 01:14:14.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit: BPF prog-id=58 op=LOAD May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1875 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565343165393031663661643166346137656662336363316665373236 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1875 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565343165393031663661643166346137656662336363316665373236 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit: BPF prog-id=59 op=LOAD May 15 01:14:14.422000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035b570 items=0 ppid=1875 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565343165393031663661643166346137656662336363316665373236 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit: BPF prog-id=60 op=LOAD May 15 01:14:14.422000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035b5b8 items=0 ppid=1875 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565343165393031663661643166346137656662336363316665373236 May 15 01:14:14.422000 audit: BPF prog-id=60 op=UNLOAD May 15 01:14:14.422000 audit: BPF prog-id=59 op=UNLOAD May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.422000 audit: BPF prog-id=61 op=LOAD May 15 01:14:14.422000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035b9c8 items=0 ppid=1875 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565343165393031663661643166346137656662336363316665373236 May 15 01:14:14.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.424000 audit: BPF prog-id=62 op=LOAD May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1892 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646230373964643630306137636263356439386363333533613661 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1892 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646230373964643630306137636263356439386363333533613661 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit: BPF prog-id=63 op=LOAD May 15 01:14:14.426000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002de6b0 items=0 ppid=1892 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646230373964643630306137636263356439386363333533613661 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit: BPF prog-id=64 op=LOAD May 15 01:14:14.426000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002de6f8 items=0 ppid=1892 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646230373964643630306137636263356439386363333533613661 May 15 01:14:14.426000 audit: BPF prog-id=64 op=UNLOAD May 15 01:14:14.426000 audit: BPF prog-id=63 op=UNLOAD May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.426000 audit: BPF prog-id=65 op=LOAD May 15 01:14:14.426000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002deb08 items=0 ppid=1892 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133646230373964643630306137636263356439386363333533613661 May 15 01:14:14.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.430000 audit: BPF prog-id=66 op=LOAD May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1918 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333037333539313636633364656239383965313062386161373834 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1918 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333037333539313636633364656239383965313062386161373834 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit: BPF prog-id=67 op=LOAD May 15 01:14:14.431000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0500 items=0 ppid=1918 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333037333539313636633364656239383965313062386161373834 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit: BPF prog-id=68 op=LOAD May 15 01:14:14.431000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0548 items=0 ppid=1918 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333037333539313636633364656239383965313062386161373834 May 15 01:14:14.431000 audit: BPF prog-id=68 op=UNLOAD May 15 01:14:14.431000 audit: BPF prog-id=67 op=UNLOAD May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { perfmon } for pid=1942 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit[1942]: AVC avc: denied { bpf } for pid=1942 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.431000 audit: BPF prog-id=69 op=LOAD May 15 01:14:14.431000 audit[1942]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0958 items=0 ppid=1918 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162333037333539313636633364656239383965313062386161373834 May 15 01:14:14.460503 env[1250]: time="2025-05-15T01:14:14.459810748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"5e41e901f6ad1f4a7efb3cc1fe726338f1a4ce340aee56390c512cc8c51a0bb9\"" May 15 01:14:14.462639 env[1250]: time="2025-05-15T01:14:14.462591019Z" level=info msg="CreateContainer within sandbox \"5e41e901f6ad1f4a7efb3cc1fe726338f1a4ce340aee56390c512cc8c51a0bb9\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 01:14:14.464738 env[1250]: time="2025-05-15T01:14:14.464699034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"a3db079dd600a7cbc5d98cc353a6a08a7866017179fbefd5479ee2fc6aa54b21\"" May 15 01:14:14.466209 env[1250]: time="2025-05-15T01:14:14.466195862Z" level=info msg="CreateContainer within sandbox \"a3db079dd600a7cbc5d98cc353a6a08a7866017179fbefd5479ee2fc6aa54b21\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 01:14:14.467022 env[1250]: time="2025-05-15T01:14:14.466612852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:ba7c34f6d676973cf436b49c7b3c1cbe,Namespace:kube-system,Attempt:0,} returns sandbox id \"ab307359166c3deb989e10b8aa784914af4ad8f17eae5d81412ba46e79b4b0f4\"" May 15 01:14:14.468276 env[1250]: time="2025-05-15T01:14:14.468260139Z" level=info msg="CreateContainer within sandbox \"ab307359166c3deb989e10b8aa784914af4ad8f17eae5d81412ba46e79b4b0f4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 01:14:14.507873 kubelet[1838]: W0515 01:14:14.507836 1838 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:14.507873 kubelet[1838]: E0515 01:14:14.507860 1838 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.100:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:14.517813 env[1250]: time="2025-05-15T01:14:14.517791907Z" level=info msg="CreateContainer within sandbox \"5e41e901f6ad1f4a7efb3cc1fe726338f1a4ce340aee56390c512cc8c51a0bb9\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"49c267c26c1b31d437a3e8abc4f210c31b7e9dc1d149af7dade0dfc3649205d1\"" May 15 01:14:14.518225 env[1250]: time="2025-05-15T01:14:14.518212281Z" level=info msg="StartContainer for \"49c267c26c1b31d437a3e8abc4f210c31b7e9dc1d149af7dade0dfc3649205d1\"" May 15 01:14:14.527597 systemd[1]: Started cri-containerd-49c267c26c1b31d437a3e8abc4f210c31b7e9dc1d149af7dade0dfc3649205d1.scope. May 15 01:14:14.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.538000 audit: BPF prog-id=70 op=LOAD May 15 01:14:14.539000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1875 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439633236376332366331623331643433376133653861626334663231 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=1875 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439633236376332366331623331643433376133653861626334663231 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.539000 audit: BPF prog-id=71 op=LOAD May 15 01:14:14.539000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000025900 items=0 ppid=1875 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439633236376332366331623331643433376133653861626334663231 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit: BPF prog-id=72 op=LOAD May 15 01:14:14.540000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000025948 items=0 ppid=1875 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439633236376332366331623331643433376133653861626334663231 May 15 01:14:14.540000 audit: BPF prog-id=72 op=UNLOAD May 15 01:14:14.540000 audit: BPF prog-id=71 op=UNLOAD May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.540000 audit: BPF prog-id=73 op=LOAD May 15 01:14:14.540000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000025d58 items=0 ppid=1875 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439633236376332366331623331643433376133653861626334663231 May 15 01:14:14.554276 env[1250]: time="2025-05-15T01:14:14.554255280Z" level=info msg="CreateContainer within sandbox \"a3db079dd600a7cbc5d98cc353a6a08a7866017179fbefd5479ee2fc6aa54b21\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c926f0facbdf1f335ac4cc6525735f519fdea37f4d4825c10bdebe4df2cc70f1\"" May 15 01:14:14.554677 env[1250]: time="2025-05-15T01:14:14.554664848Z" level=info msg="StartContainer for \"c926f0facbdf1f335ac4cc6525735f519fdea37f4d4825c10bdebe4df2cc70f1\"" May 15 01:14:14.557251 env[1250]: time="2025-05-15T01:14:14.557229028Z" level=info msg="CreateContainer within sandbox \"ab307359166c3deb989e10b8aa784914af4ad8f17eae5d81412ba46e79b4b0f4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d29cfc4c91265465dc0e7a71acea57b4ee2f6bd703186ba87c969a116b620a34\"" May 15 01:14:14.557517 env[1250]: time="2025-05-15T01:14:14.557500940Z" level=info msg="StartContainer for \"d29cfc4c91265465dc0e7a71acea57b4ee2f6bd703186ba87c969a116b620a34\"" May 15 01:14:14.573548 systemd[1]: Started cri-containerd-c926f0facbdf1f335ac4cc6525735f519fdea37f4d4825c10bdebe4df2cc70f1.scope. May 15 01:14:14.579368 systemd[1]: Started cri-containerd-d29cfc4c91265465dc0e7a71acea57b4ee2f6bd703186ba87c969a116b620a34.scope. May 15 01:14:14.584896 env[1250]: time="2025-05-15T01:14:14.583782738Z" level=info msg="StartContainer for \"49c267c26c1b31d437a3e8abc4f210c31b7e9dc1d149af7dade0dfc3649205d1\" returns successfully" May 15 01:14:14.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.586000 audit: BPF prog-id=74 op=LOAD May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1892 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323666306661636264663166333335616334636336353235373335 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1892 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323666306661636264663166333335616334636336353235373335 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit: BPF prog-id=75 op=LOAD May 15 01:14:14.587000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002206d0 items=0 ppid=1892 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323666306661636264663166333335616334636336353235373335 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit: BPF prog-id=76 op=LOAD May 15 01:14:14.587000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000220718 items=0 ppid=1892 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323666306661636264663166333335616334636336353235373335 May 15 01:14:14.587000 audit: BPF prog-id=76 op=UNLOAD May 15 01:14:14.587000 audit: BPF prog-id=75 op=UNLOAD May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { perfmon } for pid=2030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit[2030]: AVC avc: denied { bpf } for pid=2030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.587000 audit: BPF prog-id=77 op=LOAD May 15 01:14:14.587000 audit[2030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000220b28 items=0 ppid=1892 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339323666306661636264663166333335616334636336353235373335 May 15 01:14:14.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.591000 audit: BPF prog-id=78 op=LOAD May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1918 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432396366633463393132363534363564633065376137316163656135 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1918 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432396366633463393132363534363564633065376137316163656135 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit: BPF prog-id=79 op=LOAD May 15 01:14:14.592000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003993c0 items=0 ppid=1918 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432396366633463393132363534363564633065376137316163656135 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit: BPF prog-id=80 op=LOAD May 15 01:14:14.592000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000399408 items=0 ppid=1918 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432396366633463393132363534363564633065376137316163656135 May 15 01:14:14.592000 audit: BPF prog-id=80 op=UNLOAD May 15 01:14:14.592000 audit: BPF prog-id=79 op=UNLOAD May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:14.592000 audit: BPF prog-id=81 op=LOAD May 15 01:14:14.592000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000399818 items=0 ppid=1918 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:14.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432396366633463393132363534363564633065376137316163656135 May 15 01:14:14.613490 env[1250]: time="2025-05-15T01:14:14.613453229Z" level=info msg="StartContainer for \"d29cfc4c91265465dc0e7a71acea57b4ee2f6bd703186ba87c969a116b620a34\" returns successfully" May 15 01:14:14.624551 env[1250]: time="2025-05-15T01:14:14.624518034Z" level=info msg="StartContainer for \"c926f0facbdf1f335ac4cc6525735f519fdea37f4d4825c10bdebe4df2cc70f1\" returns successfully" May 15 01:14:14.628204 kubelet[1838]: W0515 01:14:14.628149 1838 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:14.628204 kubelet[1838]: E0515 01:14:14.628189 1838 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.100:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:14.780188 kubelet[1838]: E0515 01:14:14.780119 1838 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.100:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.100:6443: connect: connection refused" interval="1.6s" May 15 01:14:14.874740 kubelet[1838]: I0515 01:14:14.874538 1838 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 01:14:14.874740 kubelet[1838]: E0515 01:14:14.874709 1838 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.100:6443/api/v1/nodes\": dial tcp 139.178.70.100:6443: connect: connection refused" node="localhost" May 15 01:14:15.336370 kubelet[1838]: E0515 01:14:15.336345 1838 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.100:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.100:6443: connect: connection refused May 15 01:14:15.440000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:15.440000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00095e810 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:14:15.440000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:14:15.440000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:15.440000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000c52040 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:14:15.440000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:14:16.476089 kubelet[1838]: I0515 01:14:16.476060 1838 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 01:14:17.122000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:17.122000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0066ed7d0 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:14:17.122000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:14:17.131000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:17.131000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0066ed860 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:14:17.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:14:17.132000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:17.132000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0066ed890 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:14:17.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:14:17.173000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:17.173000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0042c6120 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:14:17.173000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:14:17.244000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:17.244000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c003b01500 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:14:17.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:14:17.245000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:17.245000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00325b4a0 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:14:17.245000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:14:17.258386 kubelet[1838]: E0515 01:14:17.258353 1838 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 01:14:17.397882 kubelet[1838]: I0515 01:14:17.397806 1838 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 01:14:17.407897 kubelet[1838]: E0515 01:14:17.407880 1838 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 01:14:18.325948 kubelet[1838]: I0515 01:14:18.325931 1838 apiserver.go:52] "Watching apiserver" May 15 01:14:18.371968 kubelet[1838]: I0515 01:14:18.371947 1838 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 01:14:19.463262 systemd[1]: Reloading. May 15 01:14:19.528992 /usr/lib/systemd/system-generators/torcx-generator[2133]: time="2025-05-15T01:14:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 15 01:14:19.529796 /usr/lib/systemd/system-generators/torcx-generator[2133]: time="2025-05-15T01:14:19Z" level=info msg="torcx already run" May 15 01:14:19.585335 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 01:14:19.585463 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 01:14:19.598494 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 01:14:19.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.651120 kernel: kauditd_printk_skb: 404 callbacks suppressed May 15 01:14:19.651189 kernel: audit: type=1400 audit(1747271659.645:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.659228 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 01:14:19.659291 kernel: audit: type=1400 audit(1747271659.645:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.659314 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 15 01:14:19.659329 kernel: audit: type=1400 audit(1747271659.645:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.659343 kernel: audit: backlog limit exceeded May 15 01:14:19.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.665303 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 01:14:19.665347 kernel: audit: type=1400 audit(1747271659.645:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.665365 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 15 01:14:19.665402 kernel: audit: type=1400 audit(1747271659.645:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit: BPF prog-id=82 op=LOAD May 15 01:14:19.652000 audit: BPF prog-id=43 op=UNLOAD May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit: BPF prog-id=83 op=LOAD May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.652000 audit: BPF prog-id=84 op=LOAD May 15 01:14:19.652000 audit: BPF prog-id=44 op=UNLOAD May 15 01:14:19.652000 audit: BPF prog-id=45 op=UNLOAD May 15 01:14:19.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.653000 audit: BPF prog-id=85 op=LOAD May 15 01:14:19.653000 audit: BPF prog-id=46 op=UNLOAD May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit: BPF prog-id=86 op=LOAD May 15 01:14:19.654000 audit: BPF prog-id=47 op=UNLOAD May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit: BPF prog-id=48 op=UNLOAD May 15 01:14:19.669000 audit: BPF prog-id=49 op=UNLOAD May 15 01:14:19.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit: BPF prog-id=89 op=LOAD May 15 01:14:19.670000 audit: BPF prog-id=50 op=UNLOAD May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit: BPF prog-id=90 op=LOAD May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.670000 audit: BPF prog-id=91 op=LOAD May 15 01:14:19.670000 audit: BPF prog-id=51 op=UNLOAD May 15 01:14:19.670000 audit: BPF prog-id=52 op=UNLOAD May 15 01:14:19.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.671000 audit: BPF prog-id=92 op=LOAD May 15 01:14:19.671000 audit: BPF prog-id=53 op=UNLOAD May 15 01:14:19.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.672000 audit: BPF prog-id=93 op=LOAD May 15 01:14:19.672000 audit: BPF prog-id=54 op=UNLOAD May 15 01:14:19.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit: BPF prog-id=94 op=LOAD May 15 01:14:19.674000 audit: BPF prog-id=70 op=UNLOAD May 15 01:14:19.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit: BPF prog-id=95 op=LOAD May 15 01:14:19.675000 audit: BPF prog-id=62 op=UNLOAD May 15 01:14:19.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.675000 audit: BPF prog-id=96 op=LOAD May 15 01:14:19.676000 audit: BPF prog-id=74 op=UNLOAD May 15 01:14:19.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit: BPF prog-id=97 op=LOAD May 15 01:14:19.676000 audit: BPF prog-id=66 op=UNLOAD May 15 01:14:19.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.677000 audit: BPF prog-id=98 op=LOAD May 15 01:14:19.677000 audit: BPF prog-id=58 op=UNLOAD May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit: BPF prog-id=99 op=LOAD May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit: BPF prog-id=100 op=LOAD May 15 01:14:19.678000 audit: BPF prog-id=55 op=UNLOAD May 15 01:14:19.678000 audit: BPF prog-id=56 op=UNLOAD May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit: BPF prog-id=101 op=LOAD May 15 01:14:19.679000 audit: BPF prog-id=57 op=UNLOAD May 15 01:14:19.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:19.680000 audit: BPF prog-id=102 op=LOAD May 15 01:14:19.680000 audit: BPF prog-id=78 op=UNLOAD May 15 01:14:19.689695 systemd[1]: Stopping kubelet.service... May 15 01:14:19.706975 systemd[1]: kubelet.service: Deactivated successfully. May 15 01:14:19.707218 systemd[1]: Stopped kubelet.service. May 15 01:14:19.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:19.708959 systemd[1]: Starting kubelet.service... May 15 01:14:22.080000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:22.080000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003ab840 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:14:22.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:14:22.080000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:22.080000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003ab8c0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:14:22.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:14:22.080000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:22.080000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003abc40 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:14:22.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:14:22.080000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:14:22.080000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003abc80 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:14:22.080000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:14:23.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:23.517251 systemd[1]: Started kubelet.service. May 15 01:14:23.611818 kubelet[2197]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 01:14:23.612098 kubelet[2197]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 01:14:23.612139 kubelet[2197]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 01:14:23.612235 kubelet[2197]: I0515 01:14:23.612215 2197 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 01:14:23.616257 kubelet[2197]: I0515 01:14:23.616241 2197 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 01:14:23.616257 kubelet[2197]: I0515 01:14:23.616255 2197 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 01:14:23.617172 kubelet[2197]: I0515 01:14:23.616372 2197 server.go:927] "Client rotation is on, will bootstrap in background" May 15 01:14:23.617210 kubelet[2197]: I0515 01:14:23.617198 2197 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 01:14:23.620503 kubelet[2197]: I0515 01:14:23.620285 2197 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 01:14:23.652182 kubelet[2197]: I0515 01:14:23.652160 2197 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 01:14:23.652326 kubelet[2197]: I0515 01:14:23.652305 2197 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 01:14:23.652435 kubelet[2197]: I0515 01:14:23.652327 2197 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 01:14:23.652503 kubelet[2197]: I0515 01:14:23.652441 2197 topology_manager.go:138] "Creating topology manager with none policy" May 15 01:14:23.652503 kubelet[2197]: I0515 01:14:23.652448 2197 container_manager_linux.go:301] "Creating device plugin manager" May 15 01:14:23.652503 kubelet[2197]: I0515 01:14:23.652473 2197 state_mem.go:36] "Initialized new in-memory state store" May 15 01:14:23.652563 kubelet[2197]: I0515 01:14:23.652530 2197 kubelet.go:400] "Attempting to sync node with API server" May 15 01:14:23.652563 kubelet[2197]: I0515 01:14:23.652539 2197 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 01:14:23.652563 kubelet[2197]: I0515 01:14:23.652552 2197 kubelet.go:312] "Adding apiserver pod source" May 15 01:14:23.652563 kubelet[2197]: I0515 01:14:23.652561 2197 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 01:14:23.655328 kubelet[2197]: I0515 01:14:23.655318 2197 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 01:14:23.655507 kubelet[2197]: I0515 01:14:23.655499 2197 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 01:14:23.655860 kubelet[2197]: I0515 01:14:23.655838 2197 server.go:1264] "Started kubelet" May 15 01:14:23.656000 audit[2197]: AVC avc: denied { mac_admin } for pid=2197 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:23.656000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 01:14:23.656000 audit[2197]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b50510 a1=c0008b7530 a2=c000b504e0 a3=25 items=0 ppid=1 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:23.656000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 01:14:23.657924 kubelet[2197]: I0515 01:14:23.657913 2197 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 01:14:23.657000 audit[2197]: AVC avc: denied { mac_admin } for pid=2197 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:23.657000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 01:14:23.657000 audit[2197]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007dfb00 a1=c0008b7548 a2=c000b505a0 a3=25 items=0 ppid=1 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:23.657000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 01:14:23.658179 kubelet[2197]: I0515 01:14:23.658170 2197 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 01:14:23.658243 kubelet[2197]: I0515 01:14:23.658236 2197 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 01:14:23.668242 kubelet[2197]: I0515 01:14:23.668227 2197 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 01:14:23.669091 kubelet[2197]: I0515 01:14:23.669082 2197 server.go:455] "Adding debug handlers to kubelet server" May 15 01:14:23.669649 kubelet[2197]: I0515 01:14:23.669618 2197 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 01:14:23.669786 kubelet[2197]: I0515 01:14:23.669774 2197 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 01:14:23.687421 kubelet[2197]: I0515 01:14:23.687402 2197 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 01:14:23.688054 kubelet[2197]: I0515 01:14:23.688045 2197 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 01:14:23.688108 kubelet[2197]: I0515 01:14:23.688101 2197 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 01:14:23.688163 kubelet[2197]: I0515 01:14:23.688156 2197 kubelet.go:2337] "Starting kubelet main sync loop" May 15 01:14:23.688230 kubelet[2197]: E0515 01:14:23.688220 2197 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 01:14:23.711006 kubelet[2197]: E0515 01:14:23.710736 2197 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 01:14:23.715064 kubelet[2197]: I0515 01:14:23.715045 2197 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 01:14:23.715208 kubelet[2197]: I0515 01:14:23.715198 2197 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 01:14:23.716139 kubelet[2197]: I0515 01:14:23.715294 2197 reconciler.go:26] "Reconciler: start to sync state" May 15 01:14:23.716139 kubelet[2197]: I0515 01:14:23.715473 2197 factory.go:221] Registration of the systemd container factory successfully May 15 01:14:23.716139 kubelet[2197]: I0515 01:14:23.715526 2197 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 01:14:23.716139 kubelet[2197]: I0515 01:14:23.716137 2197 factory.go:221] Registration of the containerd container factory successfully May 15 01:14:23.778926 kubelet[2197]: I0515 01:14:23.778864 2197 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 01:14:23.778926 kubelet[2197]: I0515 01:14:23.778886 2197 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 01:14:23.778926 kubelet[2197]: I0515 01:14:23.778897 2197 state_mem.go:36] "Initialized new in-memory state store" May 15 01:14:23.779828 kubelet[2197]: I0515 01:14:23.779818 2197 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 01:14:23.779934 kubelet[2197]: I0515 01:14:23.779916 2197 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 01:14:23.779985 kubelet[2197]: I0515 01:14:23.779978 2197 policy_none.go:49] "None policy: Start" May 15 01:14:23.780409 kubelet[2197]: I0515 01:14:23.780401 2197 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 01:14:23.780471 kubelet[2197]: I0515 01:14:23.780465 2197 state_mem.go:35] "Initializing new in-memory state store" May 15 01:14:23.780581 kubelet[2197]: I0515 01:14:23.780575 2197 state_mem.go:75] "Updated machine memory state" May 15 01:14:23.783734 kubelet[2197]: I0515 01:14:23.783725 2197 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 01:14:23.783000 audit[2197]: AVC avc: denied { mac_admin } for pid=2197 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:23.783000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 01:14:23.783000 audit[2197]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d12960 a1=c000f7c108 a2=c000d12930 a3=25 items=0 ppid=1 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:23.783000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 01:14:23.784177 kubelet[2197]: I0515 01:14:23.784166 2197 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 01:14:23.784300 kubelet[2197]: I0515 01:14:23.784285 2197 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 01:14:23.785075 kubelet[2197]: I0515 01:14:23.785067 2197 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 01:14:23.788360 kubelet[2197]: I0515 01:14:23.788341 2197 topology_manager.go:215] "Topology Admit Handler" podUID="ba7c34f6d676973cf436b49c7b3c1cbe" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 01:14:23.788415 kubelet[2197]: I0515 01:14:23.788385 2197 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 01:14:23.788443 kubelet[2197]: I0515 01:14:23.788425 2197 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 01:14:23.800449 kubelet[2197]: E0515 01:14:23.800426 2197 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 01:14:23.800570 kubelet[2197]: E0515 01:14:23.800472 2197 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 15 01:14:23.815469 kubelet[2197]: I0515 01:14:23.815450 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ba7c34f6d676973cf436b49c7b3c1cbe-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"ba7c34f6d676973cf436b49c7b3c1cbe\") " pod="kube-system/kube-apiserver-localhost" May 15 01:14:23.816201 kubelet[2197]: I0515 01:14:23.816185 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ba7c34f6d676973cf436b49c7b3c1cbe-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"ba7c34f6d676973cf436b49c7b3c1cbe\") " pod="kube-system/kube-apiserver-localhost" May 15 01:14:23.816282 kubelet[2197]: I0515 01:14:23.816262 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:23.816354 kubelet[2197]: I0515 01:14:23.816346 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:23.816423 kubelet[2197]: I0515 01:14:23.816414 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 01:14:23.819063 kubelet[2197]: I0515 01:14:23.819049 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ba7c34f6d676973cf436b49c7b3c1cbe-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"ba7c34f6d676973cf436b49c7b3c1cbe\") " pod="kube-system/kube-apiserver-localhost" May 15 01:14:23.819217 kubelet[2197]: I0515 01:14:23.819204 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:23.820212 kubelet[2197]: I0515 01:14:23.819286 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:23.821822 kubelet[2197]: I0515 01:14:23.821811 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 01:14:23.888763 kubelet[2197]: I0515 01:14:23.888571 2197 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 01:14:23.893884 kubelet[2197]: I0515 01:14:23.893866 2197 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 15 01:14:23.894025 kubelet[2197]: I0515 01:14:23.894017 2197 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 01:14:24.656002 kubelet[2197]: I0515 01:14:24.655982 2197 apiserver.go:52] "Watching apiserver" May 15 01:14:24.715480 kubelet[2197]: I0515 01:14:24.715462 2197 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 01:14:25.008800 kubelet[2197]: I0515 01:14:25.008718 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=6.008694648 podStartE2EDuration="6.008694648s" podCreationTimestamp="2025-05-15 01:14:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:14:24.962156005 +0000 UTC m=+1.391373076" watchObservedRunningTime="2025-05-15 01:14:25.008694648 +0000 UTC m=+1.437911712" May 15 01:14:25.025025 kubelet[2197]: I0515 01:14:25.024985 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=6.024974258 podStartE2EDuration="6.024974258s" podCreationTimestamp="2025-05-15 01:14:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:14:25.009215869 +0000 UTC m=+1.438432941" watchObservedRunningTime="2025-05-15 01:14:25.024974258 +0000 UTC m=+1.454191321" May 15 01:14:25.025222 kubelet[2197]: I0515 01:14:25.025195 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.02518943 podStartE2EDuration="2.02518943s" podCreationTimestamp="2025-05-15 01:14:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:14:25.020293727 +0000 UTC m=+1.449510793" watchObservedRunningTime="2025-05-15 01:14:25.02518943 +0000 UTC m=+1.454406497" May 15 01:14:27.875568 sudo[1475]: pam_unix(sudo:session): session closed for user root May 15 01:14:27.879494 kernel: kauditd_printk_skb: 274 callbacks suppressed May 15 01:14:27.879546 kernel: audit: type=1106 audit(1747271667.875:813): pid=1475 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:14:27.875000 audit[1475]: USER_END pid=1475 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:14:27.879000 audit[1475]: CRED_DISP pid=1475 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:14:27.882725 kernel: audit: type=1104 audit(1747271667.879:814): pid=1475 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 01:14:27.884767 sshd[1471]: pam_unix(sshd:session): session closed for user core May 15 01:14:27.884000 audit[1471]: USER_END pid=1471 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:14:27.886428 systemd[1]: sshd@6-139.178.70.100:22-147.75.109.163:55426.service: Deactivated successfully. May 15 01:14:27.886905 systemd[1]: session-9.scope: Deactivated successfully. May 15 01:14:27.887007 systemd[1]: session-9.scope: Consumed 2.887s CPU time. May 15 01:14:27.884000 audit[1471]: CRED_DISP pid=1471 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:14:27.892311 kernel: audit: type=1106 audit(1747271667.884:815): pid=1471 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:14:27.892353 kernel: audit: type=1104 audit(1747271667.884:816): pid=1471 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:14:27.892319 systemd-logind[1239]: Session 9 logged out. Waiting for processes to exit. May 15 01:14:27.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:55426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:27.895434 kernel: audit: type=1131 audit(1747271667.885:817): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.100:22-147.75.109.163:55426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:27.895647 systemd-logind[1239]: Removed session 9. May 15 01:14:32.197000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 01:14:32.197000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d09d80 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:14:32.206786 kernel: audit: type=1400 audit(1747271672.197:818): avc: denied { watch } for pid=2017 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8276 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 01:14:32.206885 kernel: audit: type=1300 audit(1747271672.197:818): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d09d80 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:14:32.206911 kernel: audit: type=1327 audit(1747271672.197:818): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:14:32.197000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:14:34.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-103.174.130.233:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:34.052939 systemd[1]: Started sshd@7-139.178.70.100:22-103.174.130.233:58626.service. May 15 01:14:34.056976 kernel: audit: type=1130 audit(1747271674.052:819): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-103.174.130.233:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:35.354477 sshd[2270]: Invalid user dennis from 103.174.130.233 port 58626 May 15 01:14:35.359520 sshd[2270]: pam_faillock(sshd:auth): User unknown May 15 01:14:35.360095 sshd[2270]: pam_unix(sshd:auth): check pass; user unknown May 15 01:14:35.360184 sshd[2270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.174.130.233 May 15 01:14:35.360636 sshd[2270]: pam_faillock(sshd:auth): User unknown May 15 01:14:35.360000 audit[2270]: USER_AUTH pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dennis" exe="/usr/sbin/sshd" hostname=103.174.130.233 addr=103.174.130.233 terminal=ssh res=failed' May 15 01:14:35.364750 kernel: audit: type=1100 audit(1747271675.360:820): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dennis" exe="/usr/sbin/sshd" hostname=103.174.130.233 addr=103.174.130.233 terminal=ssh res=failed' May 15 01:14:35.504272 kubelet[2197]: I0515 01:14:35.504253 2197 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 01:14:35.504770 env[1250]: time="2025-05-15T01:14:35.504749082Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 01:14:35.505104 kubelet[2197]: I0515 01:14:35.505075 2197 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 01:14:36.098899 kubelet[2197]: I0515 01:14:36.098874 2197 topology_manager.go:215] "Topology Admit Handler" podUID="c388a748-5fa3-457a-acb4-6825476a80bc" podNamespace="kube-system" podName="kube-proxy-n5l24" May 15 01:14:36.102449 systemd[1]: Created slice kubepods-besteffort-podc388a748_5fa3_457a_acb4_6825476a80bc.slice. May 15 01:14:36.199962 kubelet[2197]: I0515 01:14:36.199942 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c388a748-5fa3-457a-acb4-6825476a80bc-kube-proxy\") pod \"kube-proxy-n5l24\" (UID: \"c388a748-5fa3-457a-acb4-6825476a80bc\") " pod="kube-system/kube-proxy-n5l24" May 15 01:14:36.200101 kubelet[2197]: I0515 01:14:36.200093 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c388a748-5fa3-457a-acb4-6825476a80bc-xtables-lock\") pod \"kube-proxy-n5l24\" (UID: \"c388a748-5fa3-457a-acb4-6825476a80bc\") " pod="kube-system/kube-proxy-n5l24" May 15 01:14:36.200175 kubelet[2197]: I0515 01:14:36.200166 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c388a748-5fa3-457a-acb4-6825476a80bc-lib-modules\") pod \"kube-proxy-n5l24\" (UID: \"c388a748-5fa3-457a-acb4-6825476a80bc\") " pod="kube-system/kube-proxy-n5l24" May 15 01:14:36.200249 kubelet[2197]: I0515 01:14:36.200239 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4zbsg\" (UniqueName: \"kubernetes.io/projected/c388a748-5fa3-457a-acb4-6825476a80bc-kube-api-access-4zbsg\") pod \"kube-proxy-n5l24\" (UID: \"c388a748-5fa3-457a-acb4-6825476a80bc\") " pod="kube-system/kube-proxy-n5l24" May 15 01:14:36.410736 env[1250]: time="2025-05-15T01:14:36.410691352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n5l24,Uid:c388a748-5fa3-457a-acb4-6825476a80bc,Namespace:kube-system,Attempt:0,}" May 15 01:14:36.422363 env[1250]: time="2025-05-15T01:14:36.422299612Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:14:36.422484 env[1250]: time="2025-05-15T01:14:36.422344454Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:14:36.422484 env[1250]: time="2025-05-15T01:14:36.422355590Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:14:36.422484 env[1250]: time="2025-05-15T01:14:36.422466447Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e821c1bee321eb915dcbe4ea190039782ebb250687132f51e73b4a5746c4847 pid=2281 runtime=io.containerd.runc.v2 May 15 01:14:36.439853 systemd[1]: Started cri-containerd-0e821c1bee321eb915dcbe4ea190039782ebb250687132f51e73b4a5746c4847.scope. May 15 01:14:36.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.458033 kernel: audit: type=1400 audit(1747271676.452:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.458101 kernel: audit: type=1400 audit(1747271676.452:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.458199 kernel: audit: type=1400 audit(1747271676.452:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.463739 kernel: audit: type=1400 audit(1747271676.452:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.467742 kernel: audit: type=1400 audit(1747271676.452:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.481826 kernel: audit: type=1400 audit(1747271676.452:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.481857 kernel: audit: type=1400 audit(1747271676.452:827): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.481873 kernel: audit: type=1400 audit(1747271676.452:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.488026 env[1250]: time="2025-05-15T01:14:36.487997650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n5l24,Uid:c388a748-5fa3-457a-acb4-6825476a80bc,Namespace:kube-system,Attempt:0,} returns sandbox id \"0e821c1bee321eb915dcbe4ea190039782ebb250687132f51e73b4a5746c4847\"" May 15 01:14:36.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.454000 audit: BPF prog-id=103 op=LOAD May 15 01:14:36.455000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2281 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383231633162656533323165623931356463626534656131393030 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2281 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383231633162656533323165623931356463626534656131393030 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.455000 audit: BPF prog-id=104 op=LOAD May 15 01:14:36.455000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001858d0 items=0 ppid=2281 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383231633162656533323165623931356463626534656131393030 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.457000 audit: BPF prog-id=105 op=LOAD May 15 01:14:36.457000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185918 items=0 ppid=2281 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383231633162656533323165623931356463626534656131393030 May 15 01:14:36.459000 audit: BPF prog-id=105 op=UNLOAD May 15 01:14:36.459000 audit: BPF prog-id=104 op=UNLOAD May 15 01:14:36.459000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.459000 audit: BPF prog-id=106 op=LOAD May 15 01:14:36.459000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185d28 items=0 ppid=2281 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383231633162656533323165623931356463626534656131393030 May 15 01:14:36.491986 env[1250]: time="2025-05-15T01:14:36.491957933Z" level=info msg="CreateContainer within sandbox \"0e821c1bee321eb915dcbe4ea190039782ebb250687132f51e73b4a5746c4847\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 01:14:36.495261 kubelet[2197]: I0515 01:14:36.494659 2197 topology_manager.go:215] "Topology Admit Handler" podUID="31214e32-0d2f-4839-81c1-ddf8a3d00e86" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-t88rw" May 15 01:14:36.498485 systemd[1]: Created slice kubepods-besteffort-pod31214e32_0d2f_4839_81c1_ddf8a3d00e86.slice. May 15 01:14:36.539435 env[1250]: time="2025-05-15T01:14:36.539399791Z" level=info msg="CreateContainer within sandbox \"0e821c1bee321eb915dcbe4ea190039782ebb250687132f51e73b4a5746c4847\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b5cfb3f8805e5a6aa04f3f3c1422491225a6c73d62dad12942b5c7e73b82f74a\"" May 15 01:14:36.540600 env[1250]: time="2025-05-15T01:14:36.539874776Z" level=info msg="StartContainer for \"b5cfb3f8805e5a6aa04f3f3c1422491225a6c73d62dad12942b5c7e73b82f74a\"" May 15 01:14:36.552167 systemd[1]: Started cri-containerd-b5cfb3f8805e5a6aa04f3f3c1422491225a6c73d62dad12942b5c7e73b82f74a.scope. May 15 01:14:36.565000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3eb9b172f8 items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235636662336638383035653561366161303466336633633134323234 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.565000 audit: BPF prog-id=107 op=LOAD May 15 01:14:36.565000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024548 items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235636662336638383035653561366161303466336633633134323234 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit: BPF prog-id=108 op=LOAD May 15 01:14:36.566000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024598 items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235636662336638383035653561366161303466336633633134323234 May 15 01:14:36.566000 audit: BPF prog-id=108 op=UNLOAD May 15 01:14:36.566000 audit: BPF prog-id=107 op=UNLOAD May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.566000 audit: BPF prog-id=109 op=LOAD May 15 01:14:36.566000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024628 items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235636662336638383035653561366161303466336633633134323234 May 15 01:14:36.583789 env[1250]: time="2025-05-15T01:14:36.583750451Z" level=info msg="StartContainer for \"b5cfb3f8805e5a6aa04f3f3c1422491225a6c73d62dad12942b5c7e73b82f74a\" returns successfully" May 15 01:14:36.602011 kubelet[2197]: I0515 01:14:36.601961 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8kbvn\" (UniqueName: \"kubernetes.io/projected/31214e32-0d2f-4839-81c1-ddf8a3d00e86-kube-api-access-8kbvn\") pod \"tigera-operator-797db67f8-t88rw\" (UID: \"31214e32-0d2f-4839-81c1-ddf8a3d00e86\") " pod="tigera-operator/tigera-operator-797db67f8-t88rw" May 15 01:14:36.602011 kubelet[2197]: I0515 01:14:36.601993 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/31214e32-0d2f-4839-81c1-ddf8a3d00e86-var-lib-calico\") pod \"tigera-operator-797db67f8-t88rw\" (UID: \"31214e32-0d2f-4839-81c1-ddf8a3d00e86\") " pod="tigera-operator/tigera-operator-797db67f8-t88rw" May 15 01:14:36.802407 env[1250]: time="2025-05-15T01:14:36.802333578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-t88rw,Uid:31214e32-0d2f-4839-81c1-ddf8a3d00e86,Namespace:tigera-operator,Attempt:0,}" May 15 01:14:36.842111 env[1250]: time="2025-05-15T01:14:36.842061874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:14:36.842221 env[1250]: time="2025-05-15T01:14:36.842100607Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:14:36.842221 env[1250]: time="2025-05-15T01:14:36.842112335Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:14:36.842412 env[1250]: time="2025-05-15T01:14:36.842388470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/186c011098575ea0baf8e659ef93498387c68d87ec9de1918a3d517c23dd0d66 pid=2356 runtime=io.containerd.runc.v2 May 15 01:14:36.851065 systemd[1]: Started cri-containerd-186c011098575ea0baf8e659ef93498387c68d87ec9de1918a3d517c23dd0d66.scope. May 15 01:14:36.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit: BPF prog-id=110 op=LOAD May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2356 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366330313130393835373565613062616638653635396566393334 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2356 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366330313130393835373565613062616638653635396566393334 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit: BPF prog-id=111 op=LOAD May 15 01:14:36.871000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021cc40 items=0 ppid=2356 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366330313130393835373565613062616638653635396566393334 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.871000 audit: BPF prog-id=112 op=LOAD May 15 01:14:36.871000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021cc88 items=0 ppid=2356 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366330313130393835373565613062616638653635396566393334 May 15 01:14:36.871000 audit: BPF prog-id=112 op=UNLOAD May 15 01:14:36.871000 audit: BPF prog-id=111 op=UNLOAD May 15 01:14:36.872000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:36.872000 audit: BPF prog-id=113 op=LOAD May 15 01:14:36.872000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021d098 items=0 ppid=2356 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:36.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366330313130393835373565613062616638653635396566393334 May 15 01:14:36.899141 env[1250]: time="2025-05-15T01:14:36.899106960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-t88rw,Uid:31214e32-0d2f-4839-81c1-ddf8a3d00e86,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"186c011098575ea0baf8e659ef93498387c68d87ec9de1918a3d517c23dd0d66\"" May 15 01:14:36.901246 env[1250]: time="2025-05-15T01:14:36.901226441Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 01:14:37.315016 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3871578195.mount: Deactivated successfully. May 15 01:14:37.678807 sshd[2270]: Failed password for invalid user dennis from 103.174.130.233 port 58626 ssh2 May 15 01:14:37.731000 audit[2414]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.731000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe0378590 a2=0 a3=7fffe037857c items=0 ppid=2330 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 01:14:37.732000 audit[2415]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.732000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4b0b7740 a2=0 a3=7fff4b0b772c items=0 ppid=2330 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 01:14:37.733000 audit[2416]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.733000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdc9b6950 a2=0 a3=7fffdc9b693c items=0 ppid=2330 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 01:14:37.734000 audit[2417]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:37.734000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedda18c80 a2=0 a3=7ffedda18c6c items=0 ppid=2330 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 01:14:37.735000 audit[2418]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:37.735000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe73fcc040 a2=0 a3=7ffe73fcc02c items=0 ppid=2330 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 01:14:37.737000 audit[2419]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:37.737000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7dda04a0 a2=0 a3=7ffd7dda048c items=0 ppid=2330 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 01:14:37.849000 audit[2420]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.849000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc51254f40 a2=0 a3=7ffc51254f2c items=0 ppid=2330 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 01:14:37.867000 audit[2422]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.867000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff9416d9d0 a2=0 a3=7fff9416d9bc items=0 ppid=2330 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 01:14:37.913000 audit[2425]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.913000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffff7733b60 a2=0 a3=7ffff7733b4c items=0 ppid=2330 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 01:14:37.914000 audit[2426]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.914000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8e582700 a2=0 a3=7ffe8e5826ec items=0 ppid=2330 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 01:14:37.917000 audit[2428]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.917000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7df47d40 a2=0 a3=7ffd7df47d2c items=0 ppid=2330 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 01:14:37.918000 audit[2429]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.918000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee3073ee0 a2=0 a3=7ffee3073ecc items=0 ppid=2330 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 01:14:37.920000 audit[2431]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.920000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc61d66880 a2=0 a3=7ffc61d6686c items=0 ppid=2330 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.920000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 01:14:37.923000 audit[2434]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.923000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc12dbe90 a2=0 a3=7fffc12dbe7c items=0 ppid=2330 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 01:14:37.924000 audit[2435]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.924000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe774e7d20 a2=0 a3=7ffe774e7d0c items=0 ppid=2330 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 01:14:37.926000 audit[2437]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.926000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6d99b910 a2=0 a3=7fff6d99b8fc items=0 ppid=2330 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 01:14:37.927000 audit[2438]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.927000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8f445240 a2=0 a3=7ffc8f44522c items=0 ppid=2330 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 01:14:37.929000 audit[2440]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.929000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd33212c0 a2=0 a3=7ffdd33212ac items=0 ppid=2330 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 01:14:37.932000 audit[2443]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.932000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffe7524f0 a2=0 a3=7ffffe7524dc items=0 ppid=2330 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 01:14:37.935000 audit[2446]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.935000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf3b67120 a2=0 a3=7ffcf3b6710c items=0 ppid=2330 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 01:14:37.936000 audit[2447]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.936000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0aae78d0 a2=0 a3=7ffc0aae78bc items=0 ppid=2330 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 01:14:37.949000 audit[2449]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.949000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffefe74e0c0 a2=0 a3=7ffefe74e0ac items=0 ppid=2330 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 01:14:37.952000 audit[2452]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.952000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe00b688c0 a2=0 a3=7ffe00b688ac items=0 ppid=2330 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 01:14:37.953000 audit[2453]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.953000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9f644c60 a2=0 a3=7ffc9f644c4c items=0 ppid=2330 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 01:14:37.955000 audit[2455]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 01:14:37.955000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffeb6307480 a2=0 a3=7ffeb630746c items=0 ppid=2330 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 01:14:37.995000 audit[2461]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:37.995000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd7f6e6f10 a2=0 a3=7ffd7f6e6efc items=0 ppid=2330 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:37.995000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:38.003000 audit[2461]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:38.003000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd7f6e6f10 a2=0 a3=7ffd7f6e6efc items=0 ppid=2330 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.003000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:38.004000 audit[2466]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.004000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff71660290 a2=0 a3=7fff7166027c items=0 ppid=2330 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 01:14:38.007000 audit[2468]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.007000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe0f0ac6e0 a2=0 a3=7ffe0f0ac6cc items=0 ppid=2330 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 01:14:38.010000 audit[2471]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.010000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdbba97b80 a2=0 a3=7ffdbba97b6c items=0 ppid=2330 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 01:14:38.011000 audit[2472]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.011000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb3944370 a2=0 a3=7fffb394435c items=0 ppid=2330 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 01:14:38.014000 audit[2474]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.014000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb55ecce0 a2=0 a3=7ffdb55ecccc items=0 ppid=2330 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 01:14:38.015000 audit[2475]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.015000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec6d64460 a2=0 a3=7ffec6d6444c items=0 ppid=2330 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 01:14:38.017000 audit[2477]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.017000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd0343c550 a2=0 a3=7ffd0343c53c items=0 ppid=2330 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 01:14:38.020000 audit[2480]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.020000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc471b8d50 a2=0 a3=7ffc471b8d3c items=0 ppid=2330 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 01:14:38.021000 audit[2481]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.021000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef08df9d0 a2=0 a3=7ffef08df9bc items=0 ppid=2330 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 01:14:38.023000 audit[2483]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.023000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc0ab97580 a2=0 a3=7ffc0ab9756c items=0 ppid=2330 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 01:14:38.024000 audit[2484]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.024000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff50fef8e0 a2=0 a3=7fff50fef8cc items=0 ppid=2330 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 01:14:38.025000 audit[2486]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.025000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff655679c0 a2=0 a3=7fff655679ac items=0 ppid=2330 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 01:14:38.028000 audit[2489]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.028000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff29c81240 a2=0 a3=7fff29c8122c items=0 ppid=2330 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 01:14:38.033000 audit[2492]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.033000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffead5dc6e0 a2=0 a3=7ffead5dc6cc items=0 ppid=2330 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 01:14:38.034000 audit[2493]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.034000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc965eb390 a2=0 a3=7ffc965eb37c items=0 ppid=2330 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 01:14:38.035000 audit[2495]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.035000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd98ae2da0 a2=0 a3=7ffd98ae2d8c items=0 ppid=2330 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 01:14:38.041000 audit[2499]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.041000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd1b039b40 a2=0 a3=7ffd1b039b2c items=0 ppid=2330 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 01:14:38.042000 audit[2500]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.042000 audit[2500]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc89839d10 a2=0 a3=7ffc89839cfc items=0 ppid=2330 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 01:14:38.043000 audit[2502]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.043000 audit[2502]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe1956faa0 a2=0 a3=7ffe1956fa8c items=0 ppid=2330 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 01:14:38.044000 audit[2503]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.044000 audit[2503]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe88504fa0 a2=0 a3=7ffe88504f8c items=0 ppid=2330 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 01:14:38.046000 audit[2505]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2505 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.046000 audit[2505]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca16953a0 a2=0 a3=7ffca169538c items=0 ppid=2330 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 01:14:38.048000 audit[2508]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 01:14:38.048000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf150e9e0 a2=0 a3=7ffcf150e9cc items=0 ppid=2330 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 01:14:38.052000 audit[2510]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 01:14:38.052000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe6f266490 a2=0 a3=7ffe6f26647c items=0 ppid=2330 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.052000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:38.052000 audit[2510]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2510 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 01:14:38.052000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe6f266490 a2=0 a3=7ffe6f26647c items=0 ppid=2330 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:38.052000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:38.594282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount434840859.mount: Deactivated successfully. May 15 01:14:39.181524 env[1250]: time="2025-05-15T01:14:39.181468312Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:39.197133 sshd[2270]: Received disconnect from 103.174.130.233 port 58626:11: Bye Bye [preauth] May 15 01:14:39.197133 sshd[2270]: Disconnected from invalid user dennis 103.174.130.233 port 58626 [preauth] May 15 01:14:39.198121 systemd[1]: sshd@7-139.178.70.100:22-103.174.130.233:58626.service: Deactivated successfully. May 15 01:14:39.199957 kernel: kauditd_printk_skb: 302 callbacks suppressed May 15 01:14:39.200032 kernel: audit: type=1131 audit(1747271679.197:914): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-103.174.130.233:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:39.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.100:22-103.174.130.233:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:14:39.210967 env[1250]: time="2025-05-15T01:14:39.210932996Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:39.216635 env[1250]: time="2025-05-15T01:14:39.216612402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:39.222347 env[1250]: time="2025-05-15T01:14:39.222327013Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:39.222586 env[1250]: time="2025-05-15T01:14:39.222569722Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 01:14:39.236551 env[1250]: time="2025-05-15T01:14:39.236524799Z" level=info msg="CreateContainer within sandbox \"186c011098575ea0baf8e659ef93498387c68d87ec9de1918a3d517c23dd0d66\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 01:14:39.279611 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount214431961.mount: Deactivated successfully. May 15 01:14:39.310976 env[1250]: time="2025-05-15T01:14:39.310924880Z" level=info msg="CreateContainer within sandbox \"186c011098575ea0baf8e659ef93498387c68d87ec9de1918a3d517c23dd0d66\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"87bef0761bb94c2514d0d2e1da1b9a4b64828e57b78d25dcc9404eeddd614689\"" May 15 01:14:39.311366 env[1250]: time="2025-05-15T01:14:39.311332517Z" level=info msg="StartContainer for \"87bef0761bb94c2514d0d2e1da1b9a4b64828e57b78d25dcc9404eeddd614689\"" May 15 01:14:39.322227 systemd[1]: Started cri-containerd-87bef0761bb94c2514d0d2e1da1b9a4b64828e57b78d25dcc9404eeddd614689.scope. May 15 01:14:39.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.339012 kernel: audit: type=1400 audit(1747271679.333:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.339054 kernel: audit: type=1400 audit(1747271679.333:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.339072 kernel: audit: type=1400 audit(1747271679.333:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.341470 kernel: audit: type=1400 audit(1747271679.333:918): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343820 kernel: audit: type=1400 audit(1747271679.333:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.346226 kernel: audit: type=1400 audit(1747271679.333:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.348632 kernel: audit: type=1400 audit(1747271679.333:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.353387 kernel: audit: type=1400 audit(1747271679.333:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.353426 kernel: audit: type=1400 audit(1747271679.333:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.335000 audit: BPF prog-id=114 op=LOAD May 15 01:14:39.336000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2356 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:39.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626566303736316262393463323531346430643265316461316239 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2356 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:39.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626566303736316262393463323531346430643265316461316239 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.336000 audit: BPF prog-id=115 op=LOAD May 15 01:14:39.336000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021ec90 items=0 ppid=2356 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:39.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626566303736316262393463323531346430643265316461316239 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.343000 audit: BPF prog-id=116 op=LOAD May 15 01:14:39.343000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021ecd8 items=0 ppid=2356 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:39.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626566303736316262393463323531346430643265316461316239 May 15 01:14:39.350000 audit: BPF prog-id=116 op=UNLOAD May 15 01:14:39.350000 audit: BPF prog-id=115 op=UNLOAD May 15 01:14:39.350000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:39.350000 audit: BPF prog-id=117 op=LOAD May 15 01:14:39.350000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021f0e8 items=0 ppid=2356 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:39.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837626566303736316262393463323531346430643265316461316239 May 15 01:14:39.373240 env[1250]: time="2025-05-15T01:14:39.373207717Z" level=info msg="StartContainer for \"87bef0761bb94c2514d0d2e1da1b9a4b64828e57b78d25dcc9404eeddd614689\" returns successfully" May 15 01:14:39.556843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount942124198.mount: Deactivated successfully. May 15 01:14:40.087946 kubelet[2197]: I0515 01:14:40.087812 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-n5l24" podStartSLOduration=4.087785409 podStartE2EDuration="4.087785409s" podCreationTimestamp="2025-05-15 01:14:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:14:36.740513903 +0000 UTC m=+13.169730973" watchObservedRunningTime="2025-05-15 01:14:40.087785409 +0000 UTC m=+16.517002482" May 15 01:14:42.780000 audit[2554]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:42.780000 audit[2554]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdc414d9d0 a2=0 a3=7ffdc414d9bc items=0 ppid=2330 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:42.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:42.785000 audit[2554]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:42.785000 audit[2554]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc414d9d0 a2=0 a3=0 items=0 ppid=2330 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:42.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:42.795000 audit[2556]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2556 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:42.795000 audit[2556]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc87af12a0 a2=0 a3=7ffc87af128c items=0 ppid=2330 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:42.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:42.799000 audit[2556]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2556 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:42.799000 audit[2556]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc87af12a0 a2=0 a3=0 items=0 ppid=2330 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:42.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:42.981549 kubelet[2197]: I0515 01:14:42.981495 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-t88rw" podStartSLOduration=4.658102375 podStartE2EDuration="6.981477957s" podCreationTimestamp="2025-05-15 01:14:36 +0000 UTC" firstStartedPulling="2025-05-15 01:14:36.899977601 +0000 UTC m=+13.329194664" lastFinishedPulling="2025-05-15 01:14:39.223353182 +0000 UTC m=+15.652570246" observedRunningTime="2025-05-15 01:14:40.088905081 +0000 UTC m=+16.518122152" watchObservedRunningTime="2025-05-15 01:14:42.981477957 +0000 UTC m=+19.410695029" May 15 01:14:42.984333 kubelet[2197]: I0515 01:14:42.984294 2197 topology_manager.go:215] "Topology Admit Handler" podUID="8a72ee40-3128-459f-9fd7-e4b76016161c" podNamespace="calico-system" podName="calico-typha-68d4dd5f64-6gp2s" May 15 01:14:42.991735 systemd[1]: Created slice kubepods-besteffort-pod8a72ee40_3128_459f_9fd7_e4b76016161c.slice. May 15 01:14:43.142671 kubelet[2197]: I0515 01:14:43.142644 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ws44x\" (UniqueName: \"kubernetes.io/projected/8a72ee40-3128-459f-9fd7-e4b76016161c-kube-api-access-ws44x\") pod \"calico-typha-68d4dd5f64-6gp2s\" (UID: \"8a72ee40-3128-459f-9fd7-e4b76016161c\") " pod="calico-system/calico-typha-68d4dd5f64-6gp2s" May 15 01:14:43.142876 kubelet[2197]: I0515 01:14:43.142864 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8a72ee40-3128-459f-9fd7-e4b76016161c-typha-certs\") pod \"calico-typha-68d4dd5f64-6gp2s\" (UID: \"8a72ee40-3128-459f-9fd7-e4b76016161c\") " pod="calico-system/calico-typha-68d4dd5f64-6gp2s" May 15 01:14:43.142938 kubelet[2197]: I0515 01:14:43.142929 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8a72ee40-3128-459f-9fd7-e4b76016161c-tigera-ca-bundle\") pod \"calico-typha-68d4dd5f64-6gp2s\" (UID: \"8a72ee40-3128-459f-9fd7-e4b76016161c\") " pod="calico-system/calico-typha-68d4dd5f64-6gp2s" May 15 01:14:43.175070 kubelet[2197]: I0515 01:14:43.175043 2197 topology_manager.go:215] "Topology Admit Handler" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" podNamespace="calico-system" podName="calico-node-nj5kj" May 15 01:14:43.179091 systemd[1]: Created slice kubepods-besteffort-pod5305068c_3ee8_4fbf_840b_60831f04fb00.slice. May 15 01:14:43.243787 kubelet[2197]: I0515 01:14:43.243762 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-net-dir\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.243902 kubelet[2197]: I0515 01:14:43.243802 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-policysync\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.243902 kubelet[2197]: I0515 01:14:43.243816 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-var-lib-calico\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.243902 kubelet[2197]: I0515 01:14:43.243826 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-log-dir\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.243902 kubelet[2197]: I0515 01:14:43.243842 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-bin-dir\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.243902 kubelet[2197]: I0515 01:14:43.243851 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j8glr\" (UniqueName: \"kubernetes.io/projected/5305068c-3ee8-4fbf-840b-60831f04fb00-kube-api-access-j8glr\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.244004 kubelet[2197]: I0515 01:14:43.243860 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5305068c-3ee8-4fbf-840b-60831f04fb00-tigera-ca-bundle\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.244004 kubelet[2197]: I0515 01:14:43.243879 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-var-run-calico\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.244004 kubelet[2197]: I0515 01:14:43.243890 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-flexvol-driver-host\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.244004 kubelet[2197]: I0515 01:14:43.243905 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-lib-modules\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.244004 kubelet[2197]: I0515 01:14:43.243914 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-xtables-lock\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.244096 kubelet[2197]: I0515 01:14:43.243924 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5305068c-3ee8-4fbf-840b-60831f04fb00-node-certs\") pod \"calico-node-nj5kj\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " pod="calico-system/calico-node-nj5kj" May 15 01:14:43.301042 env[1250]: time="2025-05-15T01:14:43.301014411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68d4dd5f64-6gp2s,Uid:8a72ee40-3128-459f-9fd7-e4b76016161c,Namespace:calico-system,Attempt:0,}" May 15 01:14:43.328778 kubelet[2197]: I0515 01:14:43.328751 2197 topology_manager.go:215] "Topology Admit Handler" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" podNamespace="calico-system" podName="csi-node-driver-wtmff" May 15 01:14:43.328996 kubelet[2197]: E0515 01:14:43.328980 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:14:43.339166 env[1250]: time="2025-05-15T01:14:43.339117406Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:14:43.339272 env[1250]: time="2025-05-15T01:14:43.339176894Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:14:43.339272 env[1250]: time="2025-05-15T01:14:43.339200405Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:14:43.339425 env[1250]: time="2025-05-15T01:14:43.339386881Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533 pid=2567 runtime=io.containerd.runc.v2 May 15 01:14:43.344242 kubelet[2197]: I0515 01:14:43.344221 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cb8fa4fa-c090-4fc9-9efe-29e402cdd32f-varrun\") pod \"csi-node-driver-wtmff\" (UID: \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\") " pod="calico-system/csi-node-driver-wtmff" May 15 01:14:43.344400 kubelet[2197]: I0515 01:14:43.344390 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cb8fa4fa-c090-4fc9-9efe-29e402cdd32f-socket-dir\") pod \"csi-node-driver-wtmff\" (UID: \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\") " pod="calico-system/csi-node-driver-wtmff" May 15 01:14:43.344492 kubelet[2197]: I0515 01:14:43.344483 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cb8fa4fa-c090-4fc9-9efe-29e402cdd32f-registration-dir\") pod \"csi-node-driver-wtmff\" (UID: \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\") " pod="calico-system/csi-node-driver-wtmff" May 15 01:14:43.344588 kubelet[2197]: I0515 01:14:43.344577 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9czql\" (UniqueName: \"kubernetes.io/projected/cb8fa4fa-c090-4fc9-9efe-29e402cdd32f-kube-api-access-9czql\") pod \"csi-node-driver-wtmff\" (UID: \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\") " pod="calico-system/csi-node-driver-wtmff" May 15 01:14:43.344690 kubelet[2197]: I0515 01:14:43.344681 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cb8fa4fa-c090-4fc9-9efe-29e402cdd32f-kubelet-dir\") pod \"csi-node-driver-wtmff\" (UID: \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\") " pod="calico-system/csi-node-driver-wtmff" May 15 01:14:43.351267 kubelet[2197]: E0515 01:14:43.351248 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.351383 kubelet[2197]: W0515 01:14:43.351369 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.351454 kubelet[2197]: E0515 01:14:43.351444 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.355971 kubelet[2197]: E0515 01:14:43.355451 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.356133 kubelet[2197]: W0515 01:14:43.356118 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.356196 kubelet[2197]: E0515 01:14:43.356185 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.365592 systemd[1]: Started cri-containerd-c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533.scope. May 15 01:14:43.371750 kubelet[2197]: E0515 01:14:43.370546 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.371750 kubelet[2197]: W0515 01:14:43.370565 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.371750 kubelet[2197]: E0515 01:14:43.370579 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.399000 audit: BPF prog-id=118 op=LOAD May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646639386638363366626266336663616366326261393438666436 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646639386638363366626266336663616366326261393438666436 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit: BPF prog-id=119 op=LOAD May 15 01:14:43.400000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a5a40 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646639386638363366626266336663616366326261393438666436 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit: BPF prog-id=120 op=LOAD May 15 01:14:43.400000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a5a88 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646639386638363366626266336663616366326261393438666436 May 15 01:14:43.400000 audit: BPF prog-id=120 op=UNLOAD May 15 01:14:43.400000 audit: BPF prog-id=119 op=UNLOAD May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.400000 audit: BPF prog-id=121 op=LOAD May 15 01:14:43.400000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a5e98 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333646639386638363366626266336663616366326261393438666436 May 15 01:14:43.426097 env[1250]: time="2025-05-15T01:14:43.426065277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-68d4dd5f64-6gp2s,Uid:8a72ee40-3128-459f-9fd7-e4b76016161c,Namespace:calico-system,Attempt:0,} returns sandbox id \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\"" May 15 01:14:43.426991 env[1250]: time="2025-05-15T01:14:43.426975141Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 01:14:43.447471 kubelet[2197]: E0515 01:14:43.447449 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.447471 kubelet[2197]: W0515 01:14:43.447463 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.447580 kubelet[2197]: E0515 01:14:43.447479 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.447687 kubelet[2197]: E0515 01:14:43.447610 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.447687 kubelet[2197]: W0515 01:14:43.447616 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.447687 kubelet[2197]: E0515 01:14:43.447622 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.447880 kubelet[2197]: E0515 01:14:43.447808 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.447880 kubelet[2197]: W0515 01:14:43.447816 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.447880 kubelet[2197]: E0515 01:14:43.447828 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.448058 kubelet[2197]: E0515 01:14:43.447992 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.448058 kubelet[2197]: W0515 01:14:43.447999 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.448058 kubelet[2197]: E0515 01:14:43.448007 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.448254 kubelet[2197]: E0515 01:14:43.448172 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.448254 kubelet[2197]: W0515 01:14:43.448178 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.448254 kubelet[2197]: E0515 01:14:43.448186 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.448466 kubelet[2197]: E0515 01:14:43.448386 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.448466 kubelet[2197]: W0515 01:14:43.448394 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.448466 kubelet[2197]: E0515 01:14:43.448406 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.448647 kubelet[2197]: E0515 01:14:43.448577 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.448647 kubelet[2197]: W0515 01:14:43.448584 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.448647 kubelet[2197]: E0515 01:14:43.448592 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.448928 kubelet[2197]: E0515 01:14:43.448771 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.448928 kubelet[2197]: W0515 01:14:43.448777 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.448928 kubelet[2197]: E0515 01:14:43.448791 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.448928 kubelet[2197]: E0515 01:14:43.448873 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.448928 kubelet[2197]: W0515 01:14:43.448877 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.448928 kubelet[2197]: E0515 01:14:43.448893 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.449155 kubelet[2197]: E0515 01:14:43.449094 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.449155 kubelet[2197]: W0515 01:14:43.449100 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.449155 kubelet[2197]: E0515 01:14:43.449109 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.449325 kubelet[2197]: E0515 01:14:43.449266 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.449325 kubelet[2197]: W0515 01:14:43.449272 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.449325 kubelet[2197]: E0515 01:14:43.449280 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.449503 kubelet[2197]: E0515 01:14:43.449421 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.449503 kubelet[2197]: W0515 01:14:43.449427 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.449503 kubelet[2197]: E0515 01:14:43.449435 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.449669 kubelet[2197]: E0515 01:14:43.449605 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.449669 kubelet[2197]: W0515 01:14:43.449611 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.449669 kubelet[2197]: E0515 01:14:43.449620 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.449831 kubelet[2197]: E0515 01:14:43.449789 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.449831 kubelet[2197]: W0515 01:14:43.449794 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.449831 kubelet[2197]: E0515 01:14:43.449803 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.449974 kubelet[2197]: E0515 01:14:43.449962 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.449974 kubelet[2197]: W0515 01:14:43.449971 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.449974 kubelet[2197]: E0515 01:14:43.449979 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.450075 kubelet[2197]: E0515 01:14:43.450064 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.450075 kubelet[2197]: W0515 01:14:43.450072 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.450132 kubelet[2197]: E0515 01:14:43.450079 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.450221 kubelet[2197]: E0515 01:14:43.450212 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.450221 kubelet[2197]: W0515 01:14:43.450218 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.450284 kubelet[2197]: E0515 01:14:43.450257 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.450319 kubelet[2197]: E0515 01:14:43.450308 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.450319 kubelet[2197]: W0515 01:14:43.450314 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.450375 kubelet[2197]: E0515 01:14:43.450346 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.450402 kubelet[2197]: E0515 01:14:43.450391 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.450402 kubelet[2197]: W0515 01:14:43.450395 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.450402 kubelet[2197]: E0515 01:14:43.450401 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.450481 kubelet[2197]: E0515 01:14:43.450469 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.450481 kubelet[2197]: W0515 01:14:43.450477 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.450534 kubelet[2197]: E0515 01:14:43.450481 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.450560 kubelet[2197]: E0515 01:14:43.450557 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.450579 kubelet[2197]: W0515 01:14:43.450561 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.450579 kubelet[2197]: E0515 01:14:43.450567 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.450666 kubelet[2197]: E0515 01:14:43.450654 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.450666 kubelet[2197]: W0515 01:14:43.450662 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.450729 kubelet[2197]: E0515 01:14:43.450672 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.450775 kubelet[2197]: E0515 01:14:43.450764 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.450775 kubelet[2197]: W0515 01:14:43.450771 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.450826 kubelet[2197]: E0515 01:14:43.450778 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.451011 kubelet[2197]: E0515 01:14:43.450940 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.451011 kubelet[2197]: W0515 01:14:43.450946 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.451011 kubelet[2197]: E0515 01:14:43.450952 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.461557 kubelet[2197]: E0515 01:14:43.461507 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.461557 kubelet[2197]: W0515 01:14:43.461521 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.461557 kubelet[2197]: E0515 01:14:43.461533 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.480224 kubelet[2197]: E0515 01:14:43.480188 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:43.480224 kubelet[2197]: W0515 01:14:43.480201 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:43.480224 kubelet[2197]: E0515 01:14:43.480213 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:43.482678 env[1250]: time="2025-05-15T01:14:43.482653974Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nj5kj,Uid:5305068c-3ee8-4fbf-840b-60831f04fb00,Namespace:calico-system,Attempt:0,}" May 15 01:14:43.582421 env[1250]: time="2025-05-15T01:14:43.582365469Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:14:43.582421 env[1250]: time="2025-05-15T01:14:43.582418740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:14:43.582549 env[1250]: time="2025-05-15T01:14:43.582436180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:14:43.582624 env[1250]: time="2025-05-15T01:14:43.582595608Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265 pid=2639 runtime=io.containerd.runc.v2 May 15 01:14:43.602673 systemd[1]: Started cri-containerd-2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265.scope. May 15 01:14:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.610000 audit: BPF prog-id=122 op=LOAD May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333866633933616435353232653436376364633565303563656261 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333866633933616435353232653436376364633565303563656261 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit: BPF prog-id=123 op=LOAD May 15 01:14:43.611000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00020a5c0 items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333866633933616435353232653436376364633565303563656261 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit: BPF prog-id=124 op=LOAD May 15 01:14:43.611000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00020a608 items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333866633933616435353232653436376364633565303563656261 May 15 01:14:43.611000 audit: BPF prog-id=124 op=UNLOAD May 15 01:14:43.611000 audit: BPF prog-id=123 op=UNLOAD May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:43.611000 audit: BPF prog-id=125 op=LOAD May 15 01:14:43.611000 audit[2651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00020aa18 items=0 ppid=2639 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266333866633933616435353232653436376364633565303563656261 May 15 01:14:43.621939 env[1250]: time="2025-05-15T01:14:43.621905452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-nj5kj,Uid:5305068c-3ee8-4fbf-840b-60831f04fb00,Namespace:calico-system,Attempt:0,} returns sandbox id \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\"" May 15 01:14:43.814000 audit[2673]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:43.814000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffcb194b180 a2=0 a3=7ffcb194b16c items=0 ppid=2330 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.814000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:43.820000 audit[2673]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:43.820000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb194b180 a2=0 a3=0 items=0 ppid=2330 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:43.820000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:44.689292 kubelet[2197]: E0515 01:14:44.689263 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:14:45.483009 env[1250]: time="2025-05-15T01:14:45.482968821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:45.488474 env[1250]: time="2025-05-15T01:14:45.488444708Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:45.489389 env[1250]: time="2025-05-15T01:14:45.489368610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:45.491554 env[1250]: time="2025-05-15T01:14:45.491527175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:45.492537 env[1250]: time="2025-05-15T01:14:45.492390358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 01:14:45.493386 env[1250]: time="2025-05-15T01:14:45.493358003Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 01:14:45.511290 env[1250]: time="2025-05-15T01:14:45.511263928Z" level=info msg="CreateContainer within sandbox \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 01:14:45.518997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount663479103.mount: Deactivated successfully. May 15 01:14:45.521026 env[1250]: time="2025-05-15T01:14:45.520993827Z" level=info msg="CreateContainer within sandbox \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\"" May 15 01:14:45.521572 env[1250]: time="2025-05-15T01:14:45.521557459Z" level=info msg="StartContainer for \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\"" May 15 01:14:45.538936 systemd[1]: Started cri-containerd-73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b.scope. May 15 01:14:45.574972 kernel: kauditd_printk_skb: 180 callbacks suppressed May 15 01:14:45.575044 kernel: audit: type=1400 audit(1747271685.566:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.575067 kernel: audit: type=1400 audit(1747271685.566:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.575081 kernel: audit: type=1400 audit(1747271685.566:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.577680 kernel: audit: type=1400 audit(1747271685.566:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.577967 kernel: audit: type=1400 audit(1747271685.566:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.582694 kernel: audit: type=1400 audit(1747271685.566:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.582758 kernel: audit: type=1400 audit(1747271685.566:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.587556 kernel: audit: type=1400 audit(1747271685.566:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.590013 kernel: audit: type=1400 audit(1747271685.566:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.593725 kernel: audit: type=1400 audit(1747271685.567:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit: BPF prog-id=126 op=LOAD May 15 01:14:45.567000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2567 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:45.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643365623830393563636631623861646331633661623962393136 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2567 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:45.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643365623830393563636631623861646331633661623962393136 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.567000 audit: BPF prog-id=127 op=LOAD May 15 01:14:45.567000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b6680 items=0 ppid=2567 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:45.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643365623830393563636631623861646331633661623962393136 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.569000 audit: BPF prog-id=128 op=LOAD May 15 01:14:45.569000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b66c8 items=0 ppid=2567 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:45.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643365623830393563636631623861646331633661623962393136 May 15 01:14:45.574000 audit: BPF prog-id=128 op=UNLOAD May 15 01:14:45.574000 audit: BPF prog-id=127 op=UNLOAD May 15 01:14:45.574000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:45.574000 audit: BPF prog-id=129 op=LOAD May 15 01:14:45.574000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b6ad8 items=0 ppid=2567 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:45.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733643365623830393563636631623861646331633661623962393136 May 15 01:14:45.631135 env[1250]: time="2025-05-15T01:14:45.631107788Z" level=info msg="StartContainer for \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\" returns successfully" May 15 01:14:46.112824 kubelet[2197]: I0515 01:14:46.112780 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-68d4dd5f64-6gp2s" podStartSLOduration=2.046275364 podStartE2EDuration="4.112765483s" podCreationTimestamp="2025-05-15 01:14:42 +0000 UTC" firstStartedPulling="2025-05-15 01:14:43.426759658 +0000 UTC m=+19.855976720" lastFinishedPulling="2025-05-15 01:14:45.493249768 +0000 UTC m=+21.922466839" observedRunningTime="2025-05-15 01:14:46.112183849 +0000 UTC m=+22.541400920" watchObservedRunningTime="2025-05-15 01:14:46.112765483 +0000 UTC m=+22.541982551" May 15 01:14:46.162293 kubelet[2197]: E0515 01:14:46.162269 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.162293 kubelet[2197]: W0515 01:14:46.162287 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.162418 kubelet[2197]: E0515 01:14:46.162300 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.162418 kubelet[2197]: E0515 01:14:46.162392 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.162418 kubelet[2197]: W0515 01:14:46.162397 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.162418 kubelet[2197]: E0515 01:14:46.162402 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.162497 kubelet[2197]: E0515 01:14:46.162487 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.162497 kubelet[2197]: W0515 01:14:46.162492 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.162536 kubelet[2197]: E0515 01:14:46.162497 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.162585 kubelet[2197]: E0515 01:14:46.162573 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.162585 kubelet[2197]: W0515 01:14:46.162582 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.162640 kubelet[2197]: E0515 01:14:46.162587 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.162667 kubelet[2197]: E0515 01:14:46.162664 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.162687 kubelet[2197]: W0515 01:14:46.162668 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.162687 kubelet[2197]: E0515 01:14:46.162672 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.162764 kubelet[2197]: E0515 01:14:46.162753 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.162764 kubelet[2197]: W0515 01:14:46.162761 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.162812 kubelet[2197]: E0515 01:14:46.162766 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.162843 kubelet[2197]: E0515 01:14:46.162836 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.162843 kubelet[2197]: W0515 01:14:46.162840 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.214803 kubelet[2197]: E0515 01:14:46.162845 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.214803 kubelet[2197]: E0515 01:14:46.162914 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.214803 kubelet[2197]: W0515 01:14:46.162918 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.214803 kubelet[2197]: E0515 01:14:46.162922 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.214803 kubelet[2197]: E0515 01:14:46.163015 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.214803 kubelet[2197]: W0515 01:14:46.163021 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.214803 kubelet[2197]: E0515 01:14:46.163026 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.214803 kubelet[2197]: E0515 01:14:46.163114 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.214803 kubelet[2197]: W0515 01:14:46.163119 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.214803 kubelet[2197]: E0515 01:14:46.163124 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215035 kubelet[2197]: E0515 01:14:46.163203 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215035 kubelet[2197]: W0515 01:14:46.163207 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215035 kubelet[2197]: E0515 01:14:46.163212 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215035 kubelet[2197]: E0515 01:14:46.163295 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215035 kubelet[2197]: W0515 01:14:46.163299 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215035 kubelet[2197]: E0515 01:14:46.163304 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215035 kubelet[2197]: E0515 01:14:46.163399 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215035 kubelet[2197]: W0515 01:14:46.163404 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215035 kubelet[2197]: E0515 01:14:46.163411 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215035 kubelet[2197]: E0515 01:14:46.163507 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215240 kubelet[2197]: W0515 01:14:46.163512 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215240 kubelet[2197]: E0515 01:14:46.163516 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215240 kubelet[2197]: E0515 01:14:46.163600 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215240 kubelet[2197]: W0515 01:14:46.163604 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215240 kubelet[2197]: E0515 01:14:46.163609 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215240 kubelet[2197]: E0515 01:14:46.166842 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215240 kubelet[2197]: W0515 01:14:46.166848 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215240 kubelet[2197]: E0515 01:14:46.166855 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215240 kubelet[2197]: E0515 01:14:46.166956 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215240 kubelet[2197]: W0515 01:14:46.166960 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215499 kubelet[2197]: E0515 01:14:46.166970 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215499 kubelet[2197]: E0515 01:14:46.167069 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215499 kubelet[2197]: W0515 01:14:46.167077 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215499 kubelet[2197]: E0515 01:14:46.167088 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215499 kubelet[2197]: E0515 01:14:46.167190 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215499 kubelet[2197]: W0515 01:14:46.167195 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215499 kubelet[2197]: E0515 01:14:46.167206 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215499 kubelet[2197]: E0515 01:14:46.167303 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215499 kubelet[2197]: W0515 01:14:46.167307 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215499 kubelet[2197]: E0515 01:14:46.167316 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215832 kubelet[2197]: E0515 01:14:46.167404 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215832 kubelet[2197]: W0515 01:14:46.167410 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215832 kubelet[2197]: E0515 01:14:46.167420 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215832 kubelet[2197]: E0515 01:14:46.167518 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215832 kubelet[2197]: W0515 01:14:46.167522 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215832 kubelet[2197]: E0515 01:14:46.167531 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215832 kubelet[2197]: E0515 01:14:46.167630 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.215832 kubelet[2197]: W0515 01:14:46.167634 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.215832 kubelet[2197]: E0515 01:14:46.167643 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.215832 kubelet[2197]: E0515 01:14:46.167760 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216117 kubelet[2197]: W0515 01:14:46.167766 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216117 kubelet[2197]: E0515 01:14:46.167776 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216117 kubelet[2197]: E0515 01:14:46.167847 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216117 kubelet[2197]: W0515 01:14:46.167851 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216117 kubelet[2197]: E0515 01:14:46.167856 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216117 kubelet[2197]: E0515 01:14:46.167943 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216117 kubelet[2197]: W0515 01:14:46.167947 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216117 kubelet[2197]: E0515 01:14:46.167957 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216117 kubelet[2197]: E0515 01:14:46.168057 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216117 kubelet[2197]: W0515 01:14:46.168062 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216398 kubelet[2197]: E0515 01:14:46.168069 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216398 kubelet[2197]: E0515 01:14:46.168159 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216398 kubelet[2197]: W0515 01:14:46.168164 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216398 kubelet[2197]: E0515 01:14:46.168175 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216398 kubelet[2197]: E0515 01:14:46.168266 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216398 kubelet[2197]: W0515 01:14:46.168271 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216398 kubelet[2197]: E0515 01:14:46.168280 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216398 kubelet[2197]: E0515 01:14:46.168412 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216398 kubelet[2197]: W0515 01:14:46.168417 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216398 kubelet[2197]: E0515 01:14:46.168422 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216738 kubelet[2197]: E0515 01:14:46.168503 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216738 kubelet[2197]: W0515 01:14:46.168507 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216738 kubelet[2197]: E0515 01:14:46.168515 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216738 kubelet[2197]: E0515 01:14:46.168662 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216738 kubelet[2197]: W0515 01:14:46.168667 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216738 kubelet[2197]: E0515 01:14:46.168677 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.216738 kubelet[2197]: E0515 01:14:46.168793 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:46.216738 kubelet[2197]: W0515 01:14:46.168797 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:46.216738 kubelet[2197]: E0515 01:14:46.168803 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:46.688500 kubelet[2197]: E0515 01:14:46.688471 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:14:47.091853 kubelet[2197]: I0515 01:14:47.091780 2197 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 01:14:47.170330 kubelet[2197]: E0515 01:14:47.170236 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.170330 kubelet[2197]: W0515 01:14:47.170257 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.170330 kubelet[2197]: E0515 01:14:47.170271 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.170703 kubelet[2197]: E0515 01:14:47.170628 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.170703 kubelet[2197]: W0515 01:14:47.170635 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.170703 kubelet[2197]: E0515 01:14:47.170641 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.170886 kubelet[2197]: E0515 01:14:47.170819 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.170886 kubelet[2197]: W0515 01:14:47.170825 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.170886 kubelet[2197]: E0515 01:14:47.170831 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.171066 kubelet[2197]: E0515 01:14:47.170996 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.171066 kubelet[2197]: W0515 01:14:47.171002 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.171066 kubelet[2197]: E0515 01:14:47.171008 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.171242 kubelet[2197]: E0515 01:14:47.171174 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.171242 kubelet[2197]: W0515 01:14:47.171184 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.171242 kubelet[2197]: E0515 01:14:47.171192 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.171405 kubelet[2197]: E0515 01:14:47.171351 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.171405 kubelet[2197]: W0515 01:14:47.171357 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.171405 kubelet[2197]: E0515 01:14:47.171363 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.171570 kubelet[2197]: E0515 01:14:47.171511 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.171570 kubelet[2197]: W0515 01:14:47.171517 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.171570 kubelet[2197]: E0515 01:14:47.171522 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.171735 kubelet[2197]: E0515 01:14:47.171668 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.171735 kubelet[2197]: W0515 01:14:47.171674 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.171735 kubelet[2197]: E0515 01:14:47.171679 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.171922 kubelet[2197]: E0515 01:14:47.171860 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.171922 kubelet[2197]: W0515 01:14:47.171866 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.171922 kubelet[2197]: E0515 01:14:47.171871 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183241 kubelet[2197]: E0515 01:14:47.172012 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183241 kubelet[2197]: W0515 01:14:47.172017 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183241 kubelet[2197]: E0515 01:14:47.172026 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183241 kubelet[2197]: E0515 01:14:47.172112 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183241 kubelet[2197]: W0515 01:14:47.172117 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183241 kubelet[2197]: E0515 01:14:47.172121 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183241 kubelet[2197]: E0515 01:14:47.172217 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183241 kubelet[2197]: W0515 01:14:47.172230 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183241 kubelet[2197]: E0515 01:14:47.172235 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183241 kubelet[2197]: E0515 01:14:47.172329 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183435 kubelet[2197]: W0515 01:14:47.172335 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183435 kubelet[2197]: E0515 01:14:47.172339 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183435 kubelet[2197]: E0515 01:14:47.172428 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183435 kubelet[2197]: W0515 01:14:47.172432 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183435 kubelet[2197]: E0515 01:14:47.172438 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183435 kubelet[2197]: E0515 01:14:47.172533 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183435 kubelet[2197]: W0515 01:14:47.172538 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183435 kubelet[2197]: E0515 01:14:47.172555 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183435 kubelet[2197]: E0515 01:14:47.174766 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183435 kubelet[2197]: W0515 01:14:47.174773 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183612 kubelet[2197]: E0515 01:14:47.174781 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183612 kubelet[2197]: E0515 01:14:47.174877 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183612 kubelet[2197]: W0515 01:14:47.174881 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183612 kubelet[2197]: E0515 01:14:47.174886 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183612 kubelet[2197]: E0515 01:14:47.174985 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183612 kubelet[2197]: W0515 01:14:47.174989 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183612 kubelet[2197]: E0515 01:14:47.174995 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183612 kubelet[2197]: E0515 01:14:47.175100 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183612 kubelet[2197]: W0515 01:14:47.175104 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183612 kubelet[2197]: E0515 01:14:47.175114 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183821 kubelet[2197]: E0515 01:14:47.175214 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183821 kubelet[2197]: W0515 01:14:47.175219 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183821 kubelet[2197]: E0515 01:14:47.175226 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183821 kubelet[2197]: E0515 01:14:47.175309 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183821 kubelet[2197]: W0515 01:14:47.175313 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183821 kubelet[2197]: E0515 01:14:47.175325 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183821 kubelet[2197]: E0515 01:14:47.175421 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.183821 kubelet[2197]: W0515 01:14:47.175425 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.183821 kubelet[2197]: E0515 01:14:47.175435 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.183821 kubelet[2197]: E0515 01:14:47.175514 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184001 kubelet[2197]: W0515 01:14:47.175520 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184001 kubelet[2197]: E0515 01:14:47.175526 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184001 kubelet[2197]: E0515 01:14:47.175607 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184001 kubelet[2197]: W0515 01:14:47.175612 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184001 kubelet[2197]: E0515 01:14:47.175619 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184001 kubelet[2197]: E0515 01:14:47.175769 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184001 kubelet[2197]: W0515 01:14:47.175774 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184001 kubelet[2197]: E0515 01:14:47.175784 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184001 kubelet[2197]: E0515 01:14:47.175871 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184001 kubelet[2197]: W0515 01:14:47.175876 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184179 kubelet[2197]: E0515 01:14:47.175886 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184179 kubelet[2197]: E0515 01:14:47.175994 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184179 kubelet[2197]: W0515 01:14:47.176000 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184179 kubelet[2197]: E0515 01:14:47.176008 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184179 kubelet[2197]: E0515 01:14:47.176093 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184179 kubelet[2197]: W0515 01:14:47.176098 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184179 kubelet[2197]: E0515 01:14:47.176108 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184179 kubelet[2197]: E0515 01:14:47.176190 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184179 kubelet[2197]: W0515 01:14:47.176195 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184179 kubelet[2197]: E0515 01:14:47.176203 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184361 kubelet[2197]: E0515 01:14:47.176291 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184361 kubelet[2197]: W0515 01:14:47.176296 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184361 kubelet[2197]: E0515 01:14:47.176305 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184361 kubelet[2197]: E0515 01:14:47.176458 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184361 kubelet[2197]: W0515 01:14:47.176463 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184361 kubelet[2197]: E0515 01:14:47.176473 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184361 kubelet[2197]: E0515 01:14:47.176625 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184361 kubelet[2197]: W0515 01:14:47.176629 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184361 kubelet[2197]: E0515 01:14:47.176640 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.184361 kubelet[2197]: E0515 01:14:47.176738 2197 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 01:14:47.184556 kubelet[2197]: W0515 01:14:47.176744 2197 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 01:14:47.184556 kubelet[2197]: E0515 01:14:47.176749 2197 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 01:14:47.403474 env[1250]: time="2025-05-15T01:14:47.403452503Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:47.427514 env[1250]: time="2025-05-15T01:14:47.427478533Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:47.441824 env[1250]: time="2025-05-15T01:14:47.441798554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:47.453419 env[1250]: time="2025-05-15T01:14:47.453393940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:47.453622 env[1250]: time="2025-05-15T01:14:47.453603463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 01:14:47.455232 env[1250]: time="2025-05-15T01:14:47.455218574Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 01:14:47.540120 env[1250]: time="2025-05-15T01:14:47.540084207Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d\"" May 15 01:14:47.540775 env[1250]: time="2025-05-15T01:14:47.540758848Z" level=info msg="StartContainer for \"8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d\"" May 15 01:14:47.568431 systemd[1]: run-containerd-runc-k8s.io-8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d-runc.wRFWCa.mount: Deactivated successfully. May 15 01:14:47.569671 systemd[1]: Started cri-containerd-8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d.scope. May 15 01:14:47.579000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.579000 audit[2789]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ff1206f3948 items=0 ppid=2639 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:47.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830343765613961656163653436326664386338386662343562363538 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit: BPF prog-id=130 op=LOAD May 15 01:14:47.580000 audit[2789]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003541b8 items=0 ppid=2639 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:47.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830343765613961656163653436326664386338386662343562363538 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.580000 audit: BPF prog-id=131 op=LOAD May 15 01:14:47.580000 audit[2789]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000354208 items=0 ppid=2639 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:47.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830343765613961656163653436326664386338386662343562363538 May 15 01:14:47.581000 audit: BPF prog-id=131 op=UNLOAD May 15 01:14:47.581000 audit: BPF prog-id=130 op=UNLOAD May 15 01:14:47.581000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { perfmon } for pid=2789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit[2789]: AVC avc: denied { bpf } for pid=2789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:47.581000 audit: BPF prog-id=132 op=LOAD May 15 01:14:47.581000 audit[2789]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000354298 items=0 ppid=2639 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830343765613961656163653436326664386338386662343562363538 May 15 01:14:47.601129 env[1250]: time="2025-05-15T01:14:47.601092871Z" level=info msg="StartContainer for \"8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d\" returns successfully" May 15 01:14:47.604287 systemd[1]: cri-containerd-8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d.scope: Deactivated successfully. May 15 01:14:47.607000 audit: BPF prog-id=132 op=UNLOAD May 15 01:14:48.130889 env[1250]: time="2025-05-15T01:14:48.130853230Z" level=info msg="shim disconnected" id=8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d May 15 01:14:48.131130 env[1250]: time="2025-05-15T01:14:48.131118182Z" level=warning msg="cleaning up after shim disconnected" id=8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d namespace=k8s.io May 15 01:14:48.131194 env[1250]: time="2025-05-15T01:14:48.131185014Z" level=info msg="cleaning up dead shim" May 15 01:14:48.136040 env[1250]: time="2025-05-15T01:14:48.136012123Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:14:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2827 runtime=io.containerd.runc.v2\n" May 15 01:14:48.506990 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d-rootfs.mount: Deactivated successfully. May 15 01:14:48.689072 kubelet[2197]: E0515 01:14:48.689045 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:14:49.097693 env[1250]: time="2025-05-15T01:14:49.097649677Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 01:14:50.688413 kubelet[2197]: E0515 01:14:50.688387 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:14:52.434852 kubelet[2197]: I0515 01:14:52.434822 2197 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 01:14:52.508000 audit[2846]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:52.523922 kernel: kauditd_printk_skb: 91 callbacks suppressed May 15 01:14:52.524026 kernel: audit: type=1325 audit(1747271692.508:1000): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:52.508000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd942849f0 a2=0 a3=7ffd942849dc items=0 ppid=2330 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:52.529761 kernel: audit: type=1300 audit(1747271692.508:1000): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd942849f0 a2=0 a3=7ffd942849dc items=0 ppid=2330 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:52.529820 kernel: audit: type=1327 audit(1747271692.508:1000): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:52.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:52.532000 audit[2846]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:52.532000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd942849f0 a2=0 a3=7ffd942849dc items=0 ppid=2330 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:52.538817 kernel: audit: type=1325 audit(1747271692.532:1001): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:14:52.538870 kernel: audit: type=1300 audit(1747271692.532:1001): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd942849f0 a2=0 a3=7ffd942849dc items=0 ppid=2330 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:52.538892 kernel: audit: type=1327 audit(1747271692.532:1001): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:52.532000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:14:52.690304 kubelet[2197]: E0515 01:14:52.689187 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:14:54.688652 kubelet[2197]: E0515 01:14:54.688537 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:14:55.442932 env[1250]: time="2025-05-15T01:14:55.442873504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:55.464174 env[1250]: time="2025-05-15T01:14:55.464141558Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:55.472605 env[1250]: time="2025-05-15T01:14:55.472576634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:55.477058 env[1250]: time="2025-05-15T01:14:55.477038757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:14:55.477500 env[1250]: time="2025-05-15T01:14:55.477483254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 01:14:55.479254 env[1250]: time="2025-05-15T01:14:55.479228317Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 01:14:56.159409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2186149376.mount: Deactivated successfully. May 15 01:14:56.365571 env[1250]: time="2025-05-15T01:14:56.365529106Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b\"" May 15 01:14:56.366225 env[1250]: time="2025-05-15T01:14:56.366205898Z" level=info msg="StartContainer for \"6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b\"" May 15 01:14:56.396839 systemd[1]: Started cri-containerd-6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b.scope. May 15 01:14:56.404356 systemd[1]: run-containerd-runc-k8s.io-6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b-runc.qajUhZ.mount: Deactivated successfully. May 15 01:14:56.450000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.450000 audit[2853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcdbc0a3718 items=0 ppid=2639 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:56.457671 kernel: audit: type=1400 audit(1747271696.450:1002): avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457764 kernel: audit: type=1300 audit(1747271696.450:1002): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fcdbc0a3718 items=0 ppid=2639 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:56.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353639343236313765326235393938616330633332333865643532 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.463775 kernel: audit: type=1327 audit(1747271696.450:1002): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353639343236313765326235393938616330633332333865643532 May 15 01:14:56.463809 kernel: audit: type=1400 audit(1747271696.452:1003): avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.452000 audit: BPF prog-id=133 op=LOAD May 15 01:14:56.452000 audit[2853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028a2c8 items=0 ppid=2639 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:56.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353639343236313765326235393938616330633332333865643532 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.453000 audit: BPF prog-id=134 op=LOAD May 15 01:14:56.453000 audit[2853]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028a318 items=0 ppid=2639 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:56.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353639343236313765326235393938616330633332333865643532 May 15 01:14:56.457000 audit: BPF prog-id=134 op=UNLOAD May 15 01:14:56.457000 audit: BPF prog-id=133 op=UNLOAD May 15 01:14:56.457000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { perfmon } for pid=2853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit[2853]: AVC avc: denied { bpf } for pid=2853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:14:56.457000 audit: BPF prog-id=135 op=LOAD May 15 01:14:56.457000 audit[2853]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028a3a8 items=0 ppid=2639 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:14:56.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353639343236313765326235393938616330633332333865643532 May 15 01:14:56.559031 env[1250]: time="2025-05-15T01:14:56.558979905Z" level=info msg="StartContainer for \"6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b\" returns successfully" May 15 01:14:56.688639 kubelet[2197]: E0515 01:14:56.688594 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:14:58.689114 kubelet[2197]: E0515 01:14:58.689084 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:15:00.107473 env[1250]: time="2025-05-15T01:15:00.107425029Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 01:15:00.109643 systemd[1]: cri-containerd-6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b.scope: Deactivated successfully. May 15 01:15:00.114769 kernel: kauditd_printk_skb: 39 callbacks suppressed May 15 01:15:00.114856 kernel: audit: type=1334 audit(1747271700.112:1008): prog-id=135 op=UNLOAD May 15 01:15:00.112000 audit: BPF prog-id=135 op=UNLOAD May 15 01:15:00.126125 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b-rootfs.mount: Deactivated successfully. May 15 01:15:00.129264 env[1250]: time="2025-05-15T01:15:00.129238771Z" level=info msg="shim disconnected" id=6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b May 15 01:15:00.130102 env[1250]: time="2025-05-15T01:15:00.130085748Z" level=warning msg="cleaning up after shim disconnected" id=6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b namespace=k8s.io May 15 01:15:00.130188 env[1250]: time="2025-05-15T01:15:00.130174120Z" level=info msg="cleaning up dead shim" May 15 01:15:00.133172 kubelet[2197]: I0515 01:15:00.130288 2197 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 01:15:00.137566 env[1250]: time="2025-05-15T01:15:00.137536175Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2892 runtime=io.containerd.runc.v2\n" May 15 01:15:00.213444 kubelet[2197]: I0515 01:15:00.213397 2197 topology_manager.go:215] "Topology Admit Handler" podUID="ed686bf6-5f57-4483-afab-6f79b9da741f" podNamespace="calico-system" podName="calico-kube-controllers-6bdb6bd8f9-8g6q8" May 15 01:15:00.236864 kubelet[2197]: I0515 01:15:00.236840 2197 topology_manager.go:215] "Topology Admit Handler" podUID="6cf49426-ffa5-4b87-a387-036978b1ee62" podNamespace="calico-apiserver" podName="calico-apiserver-9f4dbf687-7rvxc" May 15 01:15:00.239411 kubelet[2197]: I0515 01:15:00.239395 2197 topology_manager.go:215] "Topology Admit Handler" podUID="8e0cc1c0-23db-422e-a082-8c150da20907" podNamespace="kube-system" podName="coredns-7db6d8ff4d-f8grq" May 15 01:15:00.239561 kubelet[2197]: I0515 01:15:00.239550 2197 topology_manager.go:215] "Topology Admit Handler" podUID="13a79e40-372b-4208-b918-f3767f012b11" podNamespace="kube-system" podName="coredns-7db6d8ff4d-nvxb8" May 15 01:15:00.239707 kubelet[2197]: I0515 01:15:00.239694 2197 topology_manager.go:215] "Topology Admit Handler" podUID="d8a122ac-2bdd-49bc-8377-b156b680505d" podNamespace="calico-apiserver" podName="calico-apiserver-9f4dbf687-f8xs5" May 15 01:15:00.239825 kubelet[2197]: I0515 01:15:00.239816 2197 topology_manager.go:215] "Topology Admit Handler" podUID="8907c9d9-e315-4aa9-8a30-55983de20102" podNamespace="calico-apiserver" podName="calico-apiserver-6b8cc979fc-pg889" May 15 01:15:00.275547 systemd[1]: Created slice kubepods-besteffort-poded686bf6_5f57_4483_afab_6f79b9da741f.slice. May 15 01:15:00.278002 systemd[1]: Created slice kubepods-besteffort-pod8907c9d9_e315_4aa9_8a30_55983de20102.slice. May 15 01:15:00.281341 systemd[1]: Created slice kubepods-besteffort-pod6cf49426_ffa5_4b87_a387_036978b1ee62.slice. May 15 01:15:00.305311 systemd[1]: Created slice kubepods-burstable-pod8e0cc1c0_23db_422e_a082_8c150da20907.slice. May 15 01:15:00.309888 systemd[1]: Created slice kubepods-burstable-pod13a79e40_372b_4208_b918_f3767f012b11.slice. May 15 01:15:00.334675 systemd[1]: Created slice kubepods-besteffort-podd8a122ac_2bdd_49bc_8377_b156b680505d.slice. May 15 01:15:00.372175 kubelet[2197]: I0515 01:15:00.371893 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8907c9d9-e315-4aa9-8a30-55983de20102-calico-apiserver-certs\") pod \"calico-apiserver-6b8cc979fc-pg889\" (UID: \"8907c9d9-e315-4aa9-8a30-55983de20102\") " pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" May 15 01:15:00.372175 kubelet[2197]: I0515 01:15:00.371925 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6cf49426-ffa5-4b87-a387-036978b1ee62-calico-apiserver-certs\") pod \"calico-apiserver-9f4dbf687-7rvxc\" (UID: \"6cf49426-ffa5-4b87-a387-036978b1ee62\") " pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" May 15 01:15:00.372175 kubelet[2197]: I0515 01:15:00.371941 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5clbw\" (UniqueName: \"kubernetes.io/projected/6cf49426-ffa5-4b87-a387-036978b1ee62-kube-api-access-5clbw\") pod \"calico-apiserver-9f4dbf687-7rvxc\" (UID: \"6cf49426-ffa5-4b87-a387-036978b1ee62\") " pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" May 15 01:15:00.372175 kubelet[2197]: I0515 01:15:00.371956 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d8a122ac-2bdd-49bc-8377-b156b680505d-calico-apiserver-certs\") pod \"calico-apiserver-9f4dbf687-f8xs5\" (UID: \"d8a122ac-2bdd-49bc-8377-b156b680505d\") " pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" May 15 01:15:00.372175 kubelet[2197]: I0515 01:15:00.371979 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2qdfz\" (UniqueName: \"kubernetes.io/projected/ed686bf6-5f57-4483-afab-6f79b9da741f-kube-api-access-2qdfz\") pod \"calico-kube-controllers-6bdb6bd8f9-8g6q8\" (UID: \"ed686bf6-5f57-4483-afab-6f79b9da741f\") " pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" May 15 01:15:00.372396 kubelet[2197]: I0515 01:15:00.371993 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cmgln\" (UniqueName: \"kubernetes.io/projected/8e0cc1c0-23db-422e-a082-8c150da20907-kube-api-access-cmgln\") pod \"coredns-7db6d8ff4d-f8grq\" (UID: \"8e0cc1c0-23db-422e-a082-8c150da20907\") " pod="kube-system/coredns-7db6d8ff4d-f8grq" May 15 01:15:00.372396 kubelet[2197]: I0515 01:15:00.372009 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/13a79e40-372b-4208-b918-f3767f012b11-config-volume\") pod \"coredns-7db6d8ff4d-nvxb8\" (UID: \"13a79e40-372b-4208-b918-f3767f012b11\") " pod="kube-system/coredns-7db6d8ff4d-nvxb8" May 15 01:15:00.372396 kubelet[2197]: I0515 01:15:00.372021 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8e0cc1c0-23db-422e-a082-8c150da20907-config-volume\") pod \"coredns-7db6d8ff4d-f8grq\" (UID: \"8e0cc1c0-23db-422e-a082-8c150da20907\") " pod="kube-system/coredns-7db6d8ff4d-f8grq" May 15 01:15:00.372396 kubelet[2197]: I0515 01:15:00.372035 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jwcqz\" (UniqueName: \"kubernetes.io/projected/13a79e40-372b-4208-b918-f3767f012b11-kube-api-access-jwcqz\") pod \"coredns-7db6d8ff4d-nvxb8\" (UID: \"13a79e40-372b-4208-b918-f3767f012b11\") " pod="kube-system/coredns-7db6d8ff4d-nvxb8" May 15 01:15:00.372396 kubelet[2197]: I0515 01:15:00.372046 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4nl8z\" (UniqueName: \"kubernetes.io/projected/d8a122ac-2bdd-49bc-8377-b156b680505d-kube-api-access-4nl8z\") pod \"calico-apiserver-9f4dbf687-f8xs5\" (UID: \"d8a122ac-2bdd-49bc-8377-b156b680505d\") " pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" May 15 01:15:00.372535 kubelet[2197]: I0515 01:15:00.372054 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p6vcd\" (UniqueName: \"kubernetes.io/projected/8907c9d9-e315-4aa9-8a30-55983de20102-kube-api-access-p6vcd\") pod \"calico-apiserver-6b8cc979fc-pg889\" (UID: \"8907c9d9-e315-4aa9-8a30-55983de20102\") " pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" May 15 01:15:00.372535 kubelet[2197]: I0515 01:15:00.372064 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ed686bf6-5f57-4483-afab-6f79b9da741f-tigera-ca-bundle\") pod \"calico-kube-controllers-6bdb6bd8f9-8g6q8\" (UID: \"ed686bf6-5f57-4483-afab-6f79b9da741f\") " pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" May 15 01:15:00.591748 env[1250]: time="2025-05-15T01:15:00.591492320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b8cc979fc-pg889,Uid:8907c9d9-e315-4aa9-8a30-55983de20102,Namespace:calico-apiserver,Attempt:0,}" May 15 01:15:00.593220 env[1250]: time="2025-05-15T01:15:00.593199317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9f4dbf687-7rvxc,Uid:6cf49426-ffa5-4b87-a387-036978b1ee62,Namespace:calico-apiserver,Attempt:0,}" May 15 01:15:00.600767 env[1250]: time="2025-05-15T01:15:00.600741056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bdb6bd8f9-8g6q8,Uid:ed686bf6-5f57-4483-afab-6f79b9da741f,Namespace:calico-system,Attempt:0,}" May 15 01:15:00.607344 env[1250]: time="2025-05-15T01:15:00.607324869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-f8grq,Uid:8e0cc1c0-23db-422e-a082-8c150da20907,Namespace:kube-system,Attempt:0,}" May 15 01:15:00.635462 env[1250]: time="2025-05-15T01:15:00.634937710Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-nvxb8,Uid:13a79e40-372b-4208-b918-f3767f012b11,Namespace:kube-system,Attempt:0,}" May 15 01:15:00.636865 env[1250]: time="2025-05-15T01:15:00.636848337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9f4dbf687-f8xs5,Uid:d8a122ac-2bdd-49bc-8377-b156b680505d,Namespace:calico-apiserver,Attempt:0,}" May 15 01:15:00.692184 systemd[1]: Created slice kubepods-besteffort-podcb8fa4fa_c090_4fc9_9efe_29e402cdd32f.slice. May 15 01:15:00.693740 env[1250]: time="2025-05-15T01:15:00.693701298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wtmff,Uid:cb8fa4fa-c090-4fc9-9efe-29e402cdd32f,Namespace:calico-system,Attempt:0,}" May 15 01:15:01.292204 env[1250]: time="2025-05-15T01:15:01.292179162Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 01:15:01.341702 env[1250]: time="2025-05-15T01:15:01.341658783Z" level=error msg="Failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.343200 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480-shm.mount: Deactivated successfully. May 15 01:15:01.343581 env[1250]: time="2025-05-15T01:15:01.343559228Z" level=error msg="encountered an error cleaning up failed sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.343658 env[1250]: time="2025-05-15T01:15:01.343641516Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bdb6bd8f9-8g6q8,Uid:ed686bf6-5f57-4483-afab-6f79b9da741f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.348865 env[1250]: time="2025-05-15T01:15:01.348827726Z" level=error msg="Failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.350322 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53-shm.mount: Deactivated successfully. May 15 01:15:01.350700 env[1250]: time="2025-05-15T01:15:01.350671299Z" level=error msg="encountered an error cleaning up failed sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.351473 env[1250]: time="2025-05-15T01:15:01.351454190Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b8cc979fc-pg889,Uid:8907c9d9-e315-4aa9-8a30-55983de20102,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.356115 env[1250]: time="2025-05-15T01:15:01.356077898Z" level=error msg="Failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.357506 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a-shm.mount: Deactivated successfully. May 15 01:15:01.359218 env[1250]: time="2025-05-15T01:15:01.359189639Z" level=error msg="encountered an error cleaning up failed sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.359277 env[1250]: time="2025-05-15T01:15:01.359229490Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9f4dbf687-7rvxc,Uid:6cf49426-ffa5-4b87-a387-036978b1ee62,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.360208 env[1250]: time="2025-05-15T01:15:01.360187182Z" level=error msg="Failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.364478 env[1250]: time="2025-05-15T01:15:01.361738401Z" level=error msg="encountered an error cleaning up failed sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.364478 env[1250]: time="2025-05-15T01:15:01.361766597Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-f8grq,Uid:8e0cc1c0-23db-422e-a082-8c150da20907,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.364478 env[1250]: time="2025-05-15T01:15:01.363367465Z" level=error msg="Failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.364478 env[1250]: time="2025-05-15T01:15:01.363633099Z" level=error msg="encountered an error cleaning up failed sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.364478 env[1250]: time="2025-05-15T01:15:01.363687134Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-nvxb8,Uid:13a79e40-372b-4208-b918-f3767f012b11,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.361560 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733-shm.mount: Deactivated successfully. May 15 01:15:01.364831 env[1250]: time="2025-05-15T01:15:01.364805065Z" level=error msg="Failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.365151 env[1250]: time="2025-05-15T01:15:01.365131329Z" level=error msg="encountered an error cleaning up failed sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.369844 env[1250]: time="2025-05-15T01:15:01.365340535Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wtmff,Uid:cb8fa4fa-c090-4fc9-9efe-29e402cdd32f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.369844 env[1250]: time="2025-05-15T01:15:01.365309216Z" level=error msg="Failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.369844 env[1250]: time="2025-05-15T01:15:01.365570981Z" level=error msg="encountered an error cleaning up failed sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.369844 env[1250]: time="2025-05-15T01:15:01.365607277Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9f4dbf687-f8xs5,Uid:d8a122ac-2bdd-49bc-8377-b156b680505d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.374430 kubelet[2197]: E0515 01:15:01.367083 2197 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.379843 kubelet[2197]: E0515 01:15:01.374474 2197 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.381615 kubelet[2197]: E0515 01:15:01.381049 2197 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" May 15 01:15:01.381615 kubelet[2197]: E0515 01:15:01.381062 2197 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" May 15 01:15:01.381615 kubelet[2197]: E0515 01:15:01.381096 2197 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" May 15 01:15:01.381615 kubelet[2197]: E0515 01:15:01.381101 2197 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" May 15 01:15:01.381874 kubelet[2197]: E0515 01:15:01.381139 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-9f4dbf687-f8xs5_calico-apiserver(d8a122ac-2bdd-49bc-8377-b156b680505d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-9f4dbf687-f8xs5_calico-apiserver(d8a122ac-2bdd-49bc-8377-b156b680505d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" podUID="d8a122ac-2bdd-49bc-8377-b156b680505d" May 15 01:15:01.381874 kubelet[2197]: E0515 01:15:01.381177 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6bdb6bd8f9-8g6q8_calico-system(ed686bf6-5f57-4483-afab-6f79b9da741f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6bdb6bd8f9-8g6q8_calico-system(ed686bf6-5f57-4483-afab-6f79b9da741f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" podUID="ed686bf6-5f57-4483-afab-6f79b9da741f" May 15 01:15:01.381874 kubelet[2197]: E0515 01:15:01.381218 2197 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.382007 kubelet[2197]: E0515 01:15:01.381236 2197 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-f8grq" May 15 01:15:01.382007 kubelet[2197]: E0515 01:15:01.381245 2197 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-f8grq" May 15 01:15:01.382007 kubelet[2197]: E0515 01:15:01.381259 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-f8grq_kube-system(8e0cc1c0-23db-422e-a082-8c150da20907)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-f8grq_kube-system(8e0cc1c0-23db-422e-a082-8c150da20907)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-f8grq" podUID="8e0cc1c0-23db-422e-a082-8c150da20907" May 15 01:15:01.382096 kubelet[2197]: E0515 01:15:01.367076 2197 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.382096 kubelet[2197]: E0515 01:15:01.381280 2197 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" May 15 01:15:01.382096 kubelet[2197]: E0515 01:15:01.381316 2197 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.382096 kubelet[2197]: E0515 01:15:01.381334 2197 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-nvxb8" May 15 01:15:01.382183 kubelet[2197]: E0515 01:15:01.381343 2197 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-nvxb8" May 15 01:15:01.382183 kubelet[2197]: E0515 01:15:01.381359 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-nvxb8_kube-system(13a79e40-372b-4208-b918-f3767f012b11)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-nvxb8_kube-system(13a79e40-372b-4208-b918-f3767f012b11)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-nvxb8" podUID="13a79e40-372b-4208-b918-f3767f012b11" May 15 01:15:01.382183 kubelet[2197]: E0515 01:15:01.381378 2197 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.382267 kubelet[2197]: E0515 01:15:01.381388 2197 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wtmff" May 15 01:15:01.382267 kubelet[2197]: E0515 01:15:01.381397 2197 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wtmff" May 15 01:15:01.382267 kubelet[2197]: E0515 01:15:01.381410 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wtmff_calico-system(cb8fa4fa-c090-4fc9-9efe-29e402cdd32f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wtmff_calico-system(cb8fa4fa-c090-4fc9-9efe-29e402cdd32f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:15:01.382383 kubelet[2197]: E0515 01:15:01.381434 2197 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:01.382383 kubelet[2197]: E0515 01:15:01.381446 2197 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" May 15 01:15:01.382383 kubelet[2197]: E0515 01:15:01.381453 2197 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" May 15 01:15:01.382450 kubelet[2197]: E0515 01:15:01.381470 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-9f4dbf687-7rvxc_calico-apiserver(6cf49426-ffa5-4b87-a387-036978b1ee62)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-9f4dbf687-7rvxc_calico-apiserver(6cf49426-ffa5-4b87-a387-036978b1ee62)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" podUID="6cf49426-ffa5-4b87-a387-036978b1ee62" May 15 01:15:01.382450 kubelet[2197]: E0515 01:15:01.382200 2197 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" May 15 01:15:01.382511 kubelet[2197]: E0515 01:15:01.382241 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6b8cc979fc-pg889_calico-apiserver(8907c9d9-e315-4aa9-8a30-55983de20102)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6b8cc979fc-pg889_calico-apiserver(8907c9d9-e315-4aa9-8a30-55983de20102)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" podUID="8907c9d9-e315-4aa9-8a30-55983de20102" May 15 01:15:02.122029 kubelet[2197]: I0515 01:15:02.121990 2197 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:02.123052 kubelet[2197]: I0515 01:15:02.123035 2197 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:02.126337 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd-shm.mount: Deactivated successfully. May 15 01:15:02.126398 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175-shm.mount: Deactivated successfully. May 15 01:15:02.126436 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc-shm.mount: Deactivated successfully. May 15 01:15:02.193741 kubelet[2197]: I0515 01:15:02.193477 2197 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:02.194682 kubelet[2197]: I0515 01:15:02.194664 2197 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:02.195495 kubelet[2197]: I0515 01:15:02.195477 2197 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:15:02.197670 kubelet[2197]: I0515 01:15:02.197651 2197 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:02.198425 kubelet[2197]: I0515 01:15:02.198407 2197 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:02.267315 env[1250]: time="2025-05-15T01:15:02.265626616Z" level=info msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" May 15 01:15:02.267315 env[1250]: time="2025-05-15T01:15:02.265955401Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:15:02.267315 env[1250]: time="2025-05-15T01:15:02.266237712Z" level=info msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" May 15 01:15:02.267315 env[1250]: time="2025-05-15T01:15:02.266481217Z" level=info msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" May 15 01:15:02.267315 env[1250]: time="2025-05-15T01:15:02.266672683Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:15:02.267315 env[1250]: time="2025-05-15T01:15:02.266937421Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:15:02.267315 env[1250]: time="2025-05-15T01:15:02.267125954Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:15:02.295533 env[1250]: time="2025-05-15T01:15:02.295494743Z" level=error msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" failed" error="failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:02.296030 kubelet[2197]: E0515 01:15:02.295892 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:02.296030 kubelet[2197]: E0515 01:15:02.295943 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733"} May 15 01:15:02.296030 kubelet[2197]: E0515 01:15:02.295991 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e0cc1c0-23db-422e-a082-8c150da20907\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:02.296030 kubelet[2197]: E0515 01:15:02.296011 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e0cc1c0-23db-422e-a082-8c150da20907\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-f8grq" podUID="8e0cc1c0-23db-422e-a082-8c150da20907" May 15 01:15:02.326432 env[1250]: time="2025-05-15T01:15:02.326394960Z" level=error msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" failed" error="failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:02.331894 env[1250]: time="2025-05-15T01:15:02.327200222Z" level=error msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" failed" error="failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:02.331894 env[1250]: time="2025-05-15T01:15:02.328766433Z" level=error msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" failed" error="failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:02.331974 kubelet[2197]: E0515 01:15:02.326694 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:15:02.331974 kubelet[2197]: E0515 01:15:02.326744 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd"} May 15 01:15:02.331974 kubelet[2197]: E0515 01:15:02.326766 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:02.331974 kubelet[2197]: E0515 01:15:02.326789 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:15:02.339865 kubelet[2197]: E0515 01:15:02.327286 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:02.339865 kubelet[2197]: E0515 01:15:02.327313 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53"} May 15 01:15:02.339865 kubelet[2197]: E0515 01:15:02.327330 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8907c9d9-e315-4aa9-8a30-55983de20102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:02.339865 kubelet[2197]: E0515 01:15:02.327340 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8907c9d9-e315-4aa9-8a30-55983de20102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" podUID="8907c9d9-e315-4aa9-8a30-55983de20102" May 15 01:15:02.340020 env[1250]: time="2025-05-15T01:15:02.332434023Z" level=error msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" failed" error="failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:02.340020 env[1250]: time="2025-05-15T01:15:02.335568215Z" level=error msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" failed" error="failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:02.340020 env[1250]: time="2025-05-15T01:15:02.335844597Z" level=error msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" failed" error="failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:02.340137 kubelet[2197]: E0515 01:15:02.328852 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:02.340137 kubelet[2197]: E0515 01:15:02.328869 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc"} May 15 01:15:02.340137 kubelet[2197]: E0515 01:15:02.328883 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"13a79e40-372b-4208-b918-f3767f012b11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:02.340137 kubelet[2197]: E0515 01:15:02.328906 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"13a79e40-372b-4208-b918-f3767f012b11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-nvxb8" podUID="13a79e40-372b-4208-b918-f3767f012b11" May 15 01:15:02.340258 kubelet[2197]: E0515 01:15:02.332569 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:02.340258 kubelet[2197]: E0515 01:15:02.332607 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480"} May 15 01:15:02.340258 kubelet[2197]: E0515 01:15:02.332628 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:02.340258 kubelet[2197]: E0515 01:15:02.332641 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" podUID="ed686bf6-5f57-4483-afab-6f79b9da741f" May 15 01:15:02.340384 kubelet[2197]: E0515 01:15:02.335726 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:02.340384 kubelet[2197]: E0515 01:15:02.335753 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175"} May 15 01:15:02.340384 kubelet[2197]: E0515 01:15:02.335777 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d8a122ac-2bdd-49bc-8377-b156b680505d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:02.340384 kubelet[2197]: E0515 01:15:02.335790 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d8a122ac-2bdd-49bc-8377-b156b680505d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" podUID="d8a122ac-2bdd-49bc-8377-b156b680505d" May 15 01:15:02.340490 kubelet[2197]: E0515 01:15:02.335936 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:02.340490 kubelet[2197]: E0515 01:15:02.335953 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a"} May 15 01:15:02.340490 kubelet[2197]: E0515 01:15:02.335968 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6cf49426-ffa5-4b87-a387-036978b1ee62\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:02.340490 kubelet[2197]: E0515 01:15:02.335989 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6cf49426-ffa5-4b87-a387-036978b1ee62\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" podUID="6cf49426-ffa5-4b87-a387-036978b1ee62" May 15 01:15:08.770840 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1317337607.mount: Deactivated successfully. May 15 01:15:09.080395 env[1250]: time="2025-05-15T01:15:09.080311448Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:15:09.107231 env[1250]: time="2025-05-15T01:15:09.107194099Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:15:09.119785 env[1250]: time="2025-05-15T01:15:09.119760004Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:15:09.136482 env[1250]: time="2025-05-15T01:15:09.136445230Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:15:09.136862 env[1250]: time="2025-05-15T01:15:09.136841226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 01:15:09.228067 env[1250]: time="2025-05-15T01:15:09.228038598Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 01:15:09.325366 env[1250]: time="2025-05-15T01:15:09.325332049Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881\"" May 15 01:15:09.326908 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1268535867.mount: Deactivated successfully. May 15 01:15:09.327963 env[1250]: time="2025-05-15T01:15:09.327929157Z" level=info msg="StartContainer for \"0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881\"" May 15 01:15:09.343789 systemd[1]: Started cri-containerd-0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881.scope. May 15 01:15:09.355000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.365875 kernel: audit: type=1400 audit(1747271709.355:1009): avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.367160 kernel: audit: type=1300 audit(1747271709.355:1009): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f0144928cc8 items=0 ppid=2639 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:09.367191 kernel: audit: type=1327 audit(1747271709.355:1009): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386464636363303263386536363539366666666561383265333731 May 15 01:15:09.355000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f0144928cc8 items=0 ppid=2639 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:09.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386464636363303263386536363539366666666561383265333731 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.372343 kernel: audit: type=1400 audit(1747271709.358:1010): avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.374982 kernel: audit: type=1400 audit(1747271709.358:1010): avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.381185 kernel: audit: type=1400 audit(1747271709.358:1010): avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.381272 kernel: audit: type=1400 audit(1747271709.358:1010): avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.384355 kernel: audit: type=1400 audit(1747271709.358:1010): avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.387143 kernel: audit: type=1400 audit(1747271709.358:1010): avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.389708 kernel: audit: type=1400 audit(1747271709.358:1010): avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit: BPF prog-id=136 op=LOAD May 15 01:15:09.358000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00027bc58 items=0 ppid=2639 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:09.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386464636363303263386536363539366666666561383265333731 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit: BPF prog-id=137 op=LOAD May 15 01:15:09.358000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00027bca8 items=0 ppid=2639 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:09.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386464636363303263386536363539366666666561383265333731 May 15 01:15:09.358000 audit: BPF prog-id=137 op=UNLOAD May 15 01:15:09.358000 audit: BPF prog-id=136 op=UNLOAD May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:09.358000 audit: BPF prog-id=138 op=LOAD May 15 01:15:09.358000 audit[3296]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00027bd38 items=0 ppid=2639 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:09.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386464636363303263386536363539366666666561383265333731 May 15 01:15:09.392861 env[1250]: time="2025-05-15T01:15:09.389955784Z" level=info msg="StartContainer for \"0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881\" returns successfully" May 15 01:15:10.199562 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 01:15:10.199702 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 01:15:10.298655 systemd[1]: cri-containerd-0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881.scope: Deactivated successfully. May 15 01:15:10.302000 audit: BPF prog-id=138 op=UNLOAD May 15 01:15:10.313873 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881-rootfs.mount: Deactivated successfully. May 15 01:15:10.478475 env[1250]: time="2025-05-15T01:15:10.478285425Z" level=info msg="shim disconnected" id=0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881 May 15 01:15:10.478475 env[1250]: time="2025-05-15T01:15:10.478316962Z" level=warning msg="cleaning up after shim disconnected" id=0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881 namespace=k8s.io May 15 01:15:10.478475 env[1250]: time="2025-05-15T01:15:10.478324366Z" level=info msg="cleaning up dead shim" May 15 01:15:10.479740 env[1250]: time="2025-05-15T01:15:10.479089378Z" level=error msg="failed sending message on channel" error="write unix /run/containerd/s/c2744edc7dce59dc116514bda5e81da3a5199e18c95cde90b7a91e040c7feb4f->@: write: broken pipe" May 15 01:15:10.480921 env[1250]: time="2025-05-15T01:15:10.479896183Z" level=error msg="ExecSync for \"0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881\" failed" error="failed to exec in container: failed to create exec \"91975dcd96605abfa61ad18d0662010f2e55483815bd3bcf4eb9978c745906a2\": ttrpc: closed: unknown" May 15 01:15:10.480921 env[1250]: time="2025-05-15T01:15:10.480830586Z" level=error msg="ExecSync for \"0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881 not found: not found" May 15 01:15:10.481006 kubelet[2197]: E0515 01:15:10.480081 2197 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = Unknown desc = failed to exec in container: failed to create exec \"91975dcd96605abfa61ad18d0662010f2e55483815bd3bcf4eb9978c745906a2\": ttrpc: closed: unknown" containerID="0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 01:15:10.483175 kubelet[2197]: E0515 01:15:10.481279 2197 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881 not found: not found" containerID="0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 01:15:10.483997 env[1250]: time="2025-05-15T01:15:10.483968558Z" level=error msg="ExecSync for \"0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881 not found: not found" May 15 01:15:10.484644 kubelet[2197]: E0515 01:15:10.484180 2197 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881 not found: not found" containerID="0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 01:15:10.488918 env[1250]: time="2025-05-15T01:15:10.488878923Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3349 runtime=io.containerd.runc.v2\n" May 15 01:15:11.291730 kubelet[2197]: I0515 01:15:11.291609 2197 scope.go:117] "RemoveContainer" containerID="0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881" May 15 01:15:11.294876 env[1250]: time="2025-05-15T01:15:11.294850529Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" May 15 01:15:11.303828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount73387652.mount: Deactivated successfully. May 15 01:15:11.308671 env[1250]: time="2025-05-15T01:15:11.308619845Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad\"" May 15 01:15:11.309357 env[1250]: time="2025-05-15T01:15:11.309189372Z" level=info msg="StartContainer for \"ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad\"" May 15 01:15:11.325164 systemd[1]: Started cri-containerd-ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad.scope. May 15 01:15:11.343000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc6e620aa18 items=0 ppid=2639 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:11.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363131336366333037353365336432303335636137343433356131 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.343000 audit: BPF prog-id=139 op=LOAD May 15 01:15:11.343000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d9ba8 items=0 ppid=2639 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:11.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363131336366333037353365336432303335636137343433356131 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit: BPF prog-id=140 op=LOAD May 15 01:15:11.344000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d9bf8 items=0 ppid=2639 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:11.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363131336366333037353365336432303335636137343433356131 May 15 01:15:11.344000 audit: BPF prog-id=140 op=UNLOAD May 15 01:15:11.344000 audit: BPF prog-id=139 op=UNLOAD May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { perfmon } for pid=3369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit[3369]: AVC avc: denied { bpf } for pid=3369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:11.344000 audit: BPF prog-id=141 op=LOAD May 15 01:15:11.344000 audit[3369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d9c88 items=0 ppid=2639 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:11.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363131336366333037353365336432303335636137343433356131 May 15 01:15:11.357458 env[1250]: time="2025-05-15T01:15:11.357427468Z" level=info msg="StartContainer for \"ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad\" returns successfully" May 15 01:15:11.414782 systemd[1]: cri-containerd-ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad.scope: Deactivated successfully. May 15 01:15:11.417000 audit: BPF prog-id=141 op=UNLOAD May 15 01:15:11.432872 env[1250]: time="2025-05-15T01:15:11.432836726Z" level=info msg="shim disconnected" id=ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad May 15 01:15:11.432872 env[1250]: time="2025-05-15T01:15:11.432866109Z" level=warning msg="cleaning up after shim disconnected" id=ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad namespace=k8s.io May 15 01:15:11.432872 env[1250]: time="2025-05-15T01:15:11.432880072Z" level=info msg="cleaning up dead shim" May 15 01:15:11.437727 env[1250]: time="2025-05-15T01:15:11.437688806Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3411 runtime=io.containerd.runc.v2\n" May 15 01:15:12.292021 kubelet[2197]: I0515 01:15:12.291996 2197 scope.go:117] "RemoveContainer" containerID="0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881" May 15 01:15:12.294048 env[1250]: time="2025-05-15T01:15:12.294018994Z" level=info msg="RemoveContainer for \"0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881\"" May 15 01:15:12.295662 env[1250]: time="2025-05-15T01:15:12.295645434Z" level=info msg="RemoveContainer for \"0d8ddccc02c8e66596fffea82e371a205f781747eeaa7ebdbc03194098c90881\" returns successfully" May 15 01:15:12.296503 kubelet[2197]: I0515 01:15:12.296486 2197 scope.go:117] "RemoveContainer" containerID="ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad" May 15 01:15:12.298657 kubelet[2197]: E0515 01:15:12.298612 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-nj5kj_calico-system(5305068c-3ee8-4fbf-840b-60831f04fb00)\"" pod="calico-system/calico-node-nj5kj" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" May 15 01:15:12.300572 systemd[1]: run-containerd-runc-k8s.io-ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad-runc.ecvY2u.mount: Deactivated successfully. May 15 01:15:12.300627 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad-rootfs.mount: Deactivated successfully. May 15 01:15:13.294397 kubelet[2197]: I0515 01:15:13.294373 2197 scope.go:117] "RemoveContainer" containerID="ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad" May 15 01:15:13.294646 kubelet[2197]: E0515 01:15:13.294624 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-nj5kj_calico-system(5305068c-3ee8-4fbf-840b-60831f04fb00)\"" pod="calico-system/calico-node-nj5kj" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" May 15 01:15:13.691093 env[1250]: time="2025-05-15T01:15:13.691064647Z" level=info msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" May 15 01:15:13.692307 env[1250]: time="2025-05-15T01:15:13.692286945Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:15:13.715531 env[1250]: time="2025-05-15T01:15:13.715490922Z" level=error msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" failed" error="failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:13.715660 env[1250]: time="2025-05-15T01:15:13.715626869Z" level=error msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" failed" error="failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:13.715978 kubelet[2197]: E0515 01:15:13.715804 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:15:13.715978 kubelet[2197]: E0515 01:15:13.715844 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd"} May 15 01:15:13.715978 kubelet[2197]: E0515 01:15:13.715878 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:13.715978 kubelet[2197]: E0515 01:15:13.715894 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:15:13.716148 kubelet[2197]: E0515 01:15:13.715917 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:13.716148 kubelet[2197]: E0515 01:15:13.715939 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc"} May 15 01:15:13.716148 kubelet[2197]: E0515 01:15:13.715954 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"13a79e40-372b-4208-b918-f3767f012b11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:13.716148 kubelet[2197]: E0515 01:15:13.715965 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"13a79e40-372b-4208-b918-f3767f012b11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-nvxb8" podUID="13a79e40-372b-4208-b918-f3767f012b11" May 15 01:15:15.444000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:15.449287 kernel: kauditd_printk_skb: 78 callbacks suppressed May 15 01:15:15.449384 kernel: audit: type=1400 audit(1747271715.444:1024): avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:15.449421 kernel: audit: type=1400 audit(1747271715.443:1023): avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:15.443000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:15.444000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002448260 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:15.458202 kernel: audit: type=1300 audit(1747271715.444:1024): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002448260 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:15.458853 kernel: audit: type=1327 audit(1747271715.444:1024): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:15.444000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:15.443000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0033bb0b0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:15.467449 kernel: audit: type=1300 audit(1747271715.443:1023): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0033bb0b0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:15.467544 kernel: audit: type=1327 audit(1747271715.443:1023): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:15.443000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:15.691995 env[1250]: time="2025-05-15T01:15:15.690918265Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:15:15.711492 env[1250]: time="2025-05-15T01:15:15.711203010Z" level=error msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" failed" error="failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:15.711864 kubelet[2197]: E0515 01:15:15.711818 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:15.712054 kubelet[2197]: E0515 01:15:15.711889 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a"} May 15 01:15:15.712054 kubelet[2197]: E0515 01:15:15.711926 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6cf49426-ffa5-4b87-a387-036978b1ee62\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:15.712054 kubelet[2197]: E0515 01:15:15.711959 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6cf49426-ffa5-4b87-a387-036978b1ee62\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" podUID="6cf49426-ffa5-4b87-a387-036978b1ee62" May 15 01:15:16.689213 env[1250]: time="2025-05-15T01:15:16.689132990Z" level=info msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" May 15 01:15:16.689466 env[1250]: time="2025-05-15T01:15:16.689121980Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:15:16.689763 env[1250]: time="2025-05-15T01:15:16.689122322Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:15:16.716298 env[1250]: time="2025-05-15T01:15:16.716253042Z" level=error msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" failed" error="failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:16.716746 kubelet[2197]: E0515 01:15:16.716648 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:16.716746 kubelet[2197]: E0515 01:15:16.716679 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480"} May 15 01:15:16.716746 kubelet[2197]: E0515 01:15:16.716700 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:16.716746 kubelet[2197]: E0515 01:15:16.716723 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" podUID="ed686bf6-5f57-4483-afab-6f79b9da741f" May 15 01:15:16.719965 env[1250]: time="2025-05-15T01:15:16.719941647Z" level=error msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" failed" error="failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:16.732093 kubelet[2197]: E0515 01:15:16.720100 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:16.732093 kubelet[2197]: E0515 01:15:16.720117 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53"} May 15 01:15:16.732093 kubelet[2197]: E0515 01:15:16.720133 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8907c9d9-e315-4aa9-8a30-55983de20102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:16.732093 kubelet[2197]: E0515 01:15:16.720143 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8907c9d9-e315-4aa9-8a30-55983de20102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" podUID="8907c9d9-e315-4aa9-8a30-55983de20102" May 15 01:15:16.755486 kubelet[2197]: E0515 01:15:16.732723 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:16.755486 kubelet[2197]: E0515 01:15:16.732748 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175"} May 15 01:15:16.755486 kubelet[2197]: E0515 01:15:16.732776 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d8a122ac-2bdd-49bc-8377-b156b680505d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:16.755486 kubelet[2197]: E0515 01:15:16.732789 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d8a122ac-2bdd-49bc-8377-b156b680505d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" podUID="d8a122ac-2bdd-49bc-8377-b156b680505d" May 15 01:15:16.755695 env[1250]: time="2025-05-15T01:15:16.732588862Z" level=error msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" failed" error="failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:17.129000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:17.129000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00d3d71d0 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:15:17.137613 kernel: audit: type=1400 audit(1747271717.129:1025): avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:17.137782 kernel: audit: type=1300 audit(1747271717.129:1025): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00d3d71d0 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:15:17.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:15:17.141742 kernel: audit: type=1327 audit(1747271717.129:1025): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:15:17.141864 kernel: audit: type=1400 audit(1747271717.132:1026): avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:17.132000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:17.132000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00d486150 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:15:17.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:15:17.132000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:17.132000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00d3d7200 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:15:17.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:15:17.173000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:17.173000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00f551b80 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:15:17.173000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:15:17.245000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:17.245000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00e7f9c20 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:15:17.245000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:15:17.245000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:17.245000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00e548780 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:15:17.245000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:15:17.689449 env[1250]: time="2025-05-15T01:15:17.689426465Z" level=info msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" May 15 01:15:17.711256 env[1250]: time="2025-05-15T01:15:17.711221670Z" level=error msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" failed" error="failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:17.711764 kubelet[2197]: E0515 01:15:17.711484 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:17.711833 kubelet[2197]: E0515 01:15:17.711775 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733"} May 15 01:15:17.711833 kubelet[2197]: E0515 01:15:17.711821 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e0cc1c0-23db-422e-a082-8c150da20907\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:17.711926 kubelet[2197]: E0515 01:15:17.711840 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e0cc1c0-23db-422e-a082-8c150da20907\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-f8grq" podUID="8e0cc1c0-23db-422e-a082-8c150da20907" May 15 01:15:22.081000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:22.082760 kernel: kauditd_printk_skb: 14 callbacks suppressed May 15 01:15:22.082823 kernel: audit: type=1400 audit(1747271722.081:1031): avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:22.081000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:22.088982 kernel: audit: type=1400 audit(1747271722.081:1032): avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:22.089056 kernel: audit: type=1300 audit(1747271722.081:1031): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002898160 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:22.081000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002898160 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:22.081000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:22.096515 kernel: audit: type=1327 audit(1747271722.081:1031): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:22.096597 kernel: audit: type=1300 audit(1747271722.081:1032): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024486c0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:22.081000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024486c0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:22.081000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:22.103931 kernel: audit: type=1327 audit(1747271722.081:1032): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:22.104009 kernel: audit: type=1400 audit(1747271722.082:1033): avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:22.082000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:22.082000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002448700 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:22.114219 kernel: audit: type=1300 audit(1747271722.082:1033): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002448700 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:22.114263 kernel: audit: type=1327 audit(1747271722.082:1033): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:22.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:22.082000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:22.119521 kernel: audit: type=1400 audit(1747271722.082:1034): avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:15:22.082000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002448720 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:15:22.082000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:15:25.690117 env[1250]: time="2025-05-15T01:15:25.689528752Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:15:25.717706 env[1250]: time="2025-05-15T01:15:25.717667622Z" level=error msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" failed" error="failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:25.717989 kubelet[2197]: E0515 01:15:25.717961 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:15:25.718205 kubelet[2197]: E0515 01:15:25.717997 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd"} May 15 01:15:25.718205 kubelet[2197]: E0515 01:15:25.718052 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:25.718205 kubelet[2197]: E0515 01:15:25.718069 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:15:28.689419 kubelet[2197]: I0515 01:15:28.689396 2197 scope.go:117] "RemoveContainer" containerID="ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad" May 15 01:15:28.689848 env[1250]: time="2025-05-15T01:15:28.689824691Z" level=info msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" May 15 01:15:28.692789 env[1250]: time="2025-05-15T01:15:28.692751141Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" May 15 01:15:28.705669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3926647859.mount: Deactivated successfully. May 15 01:15:28.709403 env[1250]: time="2025-05-15T01:15:28.709377160Z" level=info msg="CreateContainer within sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d\"" May 15 01:15:28.710817 env[1250]: time="2025-05-15T01:15:28.710792840Z" level=info msg="StartContainer for \"c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d\"" May 15 01:15:28.722127 env[1250]: time="2025-05-15T01:15:28.722088381Z" level=error msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" failed" error="failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:28.722402 kubelet[2197]: E0515 01:15:28.722294 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:28.722402 kubelet[2197]: E0515 01:15:28.722331 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc"} May 15 01:15:28.722402 kubelet[2197]: E0515 01:15:28.722354 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"13a79e40-372b-4208-b918-f3767f012b11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:28.722402 kubelet[2197]: E0515 01:15:28.722368 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"13a79e40-372b-4208-b918-f3767f012b11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-nvxb8" podUID="13a79e40-372b-4208-b918-f3767f012b11" May 15 01:15:28.733901 systemd[1]: Started cri-containerd-c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d.scope. May 15 01:15:28.752737 kernel: kauditd_printk_skb: 2 callbacks suppressed May 15 01:15:28.757163 kernel: audit: type=1400 audit(1747271728.748:1035): avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.757216 kernel: audit: type=1300 audit(1747271728.748:1035): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f72667acb98 items=0 ppid=2639 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:28.761080 kernel: audit: type=1327 audit(1747271728.748:1035): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373261663138316637383835623236643533666432653731383737 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.772546 kernel: audit: type=1400 audit(1747271728.748:1036): avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.772605 kernel: audit: type=1400 audit(1747271728.748:1036): avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.772622 kernel: audit: type=1400 audit(1747271728.748:1036): avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.772636 kernel: audit: type=1400 audit(1747271728.748:1036): avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f72667acb98 items=0 ppid=2639 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:28.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373261663138316637383835623236643533666432653731383737 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.778297 kernel: audit: type=1400 audit(1747271728.748:1036): avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.778340 kernel: audit: type=1400 audit(1747271728.748:1036): avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.781724 kernel: audit: type=1400 audit(1747271728.748:1036): avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.748000 audit: BPF prog-id=142 op=LOAD May 15 01:15:28.748000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001c0e68 items=0 ppid=2639 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:28.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373261663138316637383835623236643533666432653731383737 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit: BPF prog-id=143 op=LOAD May 15 01:15:28.752000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001c0eb8 items=0 ppid=2639 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:28.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373261663138316637383835623236643533666432653731383737 May 15 01:15:28.752000 audit: BPF prog-id=143 op=UNLOAD May 15 01:15:28.752000 audit: BPF prog-id=142 op=UNLOAD May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:28.752000 audit: BPF prog-id=144 op=LOAD May 15 01:15:28.752000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001c0f48 items=0 ppid=2639 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:28.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335373261663138316637383835623236643533666432653731383737 May 15 01:15:28.784543 env[1250]: time="2025-05-15T01:15:28.783476707Z" level=info msg="StartContainer for \"c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d\" returns successfully" May 15 01:15:28.895155 systemd[1]: cri-containerd-c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d.scope: Deactivated successfully. May 15 01:15:28.898000 audit: BPF prog-id=144 op=UNLOAD May 15 01:15:28.957115 env[1250]: time="2025-05-15T01:15:28.957042033Z" level=info msg="shim disconnected" id=c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d May 15 01:15:28.957369 env[1250]: time="2025-05-15T01:15:28.957356744Z" level=warning msg="cleaning up after shim disconnected" id=c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d namespace=k8s.io May 15 01:15:28.957622 env[1250]: time="2025-05-15T01:15:28.957581056Z" level=info msg="cleaning up dead shim" May 15 01:15:28.962512 env[1250]: time="2025-05-15T01:15:28.962485099Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3664 runtime=io.containerd.runc.v2\n" May 15 01:15:29.346364 kubelet[2197]: I0515 01:15:29.345207 2197 scope.go:117] "RemoveContainer" containerID="ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad" May 15 01:15:29.346364 kubelet[2197]: I0515 01:15:29.345508 2197 scope.go:117] "RemoveContainer" containerID="c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d" May 15 01:15:29.346364 kubelet[2197]: E0515 01:15:29.345954 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-nj5kj_calico-system(5305068c-3ee8-4fbf-840b-60831f04fb00)\"" pod="calico-system/calico-node-nj5kj" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" May 15 01:15:29.347656 env[1250]: time="2025-05-15T01:15:29.347625294Z" level=info msg="RemoveContainer for \"ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad\"" May 15 01:15:29.350727 env[1250]: time="2025-05-15T01:15:29.350677901Z" level=info msg="RemoveContainer for \"ca6113cf30753e3d2035ca74435a1b09dab5b144e75a0ca250fb8883f4347fad\" returns successfully" May 15 01:15:29.690219 env[1250]: time="2025-05-15T01:15:29.690196215Z" level=info msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" May 15 01:15:29.691423 env[1250]: time="2025-05-15T01:15:29.690790466Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:15:29.691472 env[1250]: time="2025-05-15T01:15:29.690884143Z" level=info msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" May 15 01:15:29.702682 systemd[1]: run-containerd-runc-k8s.io-c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d-runc.rNGY4y.mount: Deactivated successfully. May 15 01:15:29.702749 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d-rootfs.mount: Deactivated successfully. May 15 01:15:29.717761 env[1250]: time="2025-05-15T01:15:29.717723275Z" level=error msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" failed" error="failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:29.718097 kubelet[2197]: E0515 01:15:29.717982 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:29.718097 kubelet[2197]: E0515 01:15:29.718018 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733"} May 15 01:15:29.718097 kubelet[2197]: E0515 01:15:29.718048 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e0cc1c0-23db-422e-a082-8c150da20907\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:29.718097 kubelet[2197]: E0515 01:15:29.718068 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e0cc1c0-23db-422e-a082-8c150da20907\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-f8grq" podUID="8e0cc1c0-23db-422e-a082-8c150da20907" May 15 01:15:29.728181 env[1250]: time="2025-05-15T01:15:29.728149991Z" level=error msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" failed" error="failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:29.728442 kubelet[2197]: E0515 01:15:29.728345 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:29.728442 kubelet[2197]: E0515 01:15:29.728374 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53"} May 15 01:15:29.728442 kubelet[2197]: E0515 01:15:29.728400 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8907c9d9-e315-4aa9-8a30-55983de20102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:29.728442 kubelet[2197]: E0515 01:15:29.728415 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8907c9d9-e315-4aa9-8a30-55983de20102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" podUID="8907c9d9-e315-4aa9-8a30-55983de20102" May 15 01:15:29.741677 env[1250]: time="2025-05-15T01:15:29.741636463Z" level=error msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" failed" error="failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:29.741930 kubelet[2197]: E0515 01:15:29.741845 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:29.741930 kubelet[2197]: E0515 01:15:29.741871 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480"} May 15 01:15:29.741930 kubelet[2197]: E0515 01:15:29.741892 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:29.741930 kubelet[2197]: E0515 01:15:29.741905 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" podUID="ed686bf6-5f57-4483-afab-6f79b9da741f" May 15 01:15:30.688918 env[1250]: time="2025-05-15T01:15:30.688891318Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:15:30.708682 env[1250]: time="2025-05-15T01:15:30.708645607Z" level=error msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" failed" error="failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:30.709079 kubelet[2197]: E0515 01:15:30.709044 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:30.709130 kubelet[2197]: E0515 01:15:30.709078 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a"} May 15 01:15:30.709130 kubelet[2197]: E0515 01:15:30.709113 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6cf49426-ffa5-4b87-a387-036978b1ee62\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:30.709214 kubelet[2197]: E0515 01:15:30.709129 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6cf49426-ffa5-4b87-a387-036978b1ee62\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" podUID="6cf49426-ffa5-4b87-a387-036978b1ee62" May 15 01:15:31.690219 env[1250]: time="2025-05-15T01:15:31.690180338Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:15:31.713891 env[1250]: time="2025-05-15T01:15:31.713847053Z" level=error msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" failed" error="failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:31.714349 kubelet[2197]: E0515 01:15:31.714319 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:31.714560 kubelet[2197]: E0515 01:15:31.714353 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175"} May 15 01:15:31.714560 kubelet[2197]: E0515 01:15:31.714376 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d8a122ac-2bdd-49bc-8377-b156b680505d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:31.714560 kubelet[2197]: E0515 01:15:31.714395 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d8a122ac-2bdd-49bc-8377-b156b680505d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" podUID="d8a122ac-2bdd-49bc-8377-b156b680505d" May 15 01:15:33.755032 kubelet[2197]: I0515 01:15:33.755011 2197 scope.go:117] "RemoveContainer" containerID="c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d" May 15 01:15:33.755551 kubelet[2197]: E0515 01:15:33.755537 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-nj5kj_calico-system(5305068c-3ee8-4fbf-840b-60831f04fb00)\"" pod="calico-system/calico-node-nj5kj" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" May 15 01:15:36.689908 env[1250]: time="2025-05-15T01:15:36.689668095Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:15:36.720845 env[1250]: time="2025-05-15T01:15:36.720788805Z" level=error msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" failed" error="failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:36.721069 kubelet[2197]: E0515 01:15:36.721035 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:15:36.721294 kubelet[2197]: E0515 01:15:36.721281 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd"} May 15 01:15:36.721373 kubelet[2197]: E0515 01:15:36.721361 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:36.721466 kubelet[2197]: E0515 01:15:36.721453 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:15:38.380677 kubelet[2197]: I0515 01:15:38.380654 2197 scope.go:117] "RemoveContainer" containerID="c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d" May 15 01:15:38.381328 kubelet[2197]: E0515 01:15:38.381311 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-nj5kj_calico-system(5305068c-3ee8-4fbf-840b-60831f04fb00)\"" pod="calico-system/calico-node-nj5kj" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" May 15 01:15:39.691111 env[1250]: time="2025-05-15T01:15:39.690201979Z" level=info msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" May 15 01:15:39.711345 env[1250]: time="2025-05-15T01:15:39.711310258Z" level=error msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" failed" error="failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:39.711651 kubelet[2197]: E0515 01:15:39.711559 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:39.711651 kubelet[2197]: E0515 01:15:39.711591 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc"} May 15 01:15:39.711651 kubelet[2197]: E0515 01:15:39.711614 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"13a79e40-372b-4208-b918-f3767f012b11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:39.711651 kubelet[2197]: E0515 01:15:39.711628 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"13a79e40-372b-4208-b918-f3767f012b11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-nvxb8" podUID="13a79e40-372b-4208-b918-f3767f012b11" May 15 01:15:40.688927 env[1250]: time="2025-05-15T01:15:40.688898376Z" level=info msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" May 15 01:15:40.706792 env[1250]: time="2025-05-15T01:15:40.706751513Z" level=error msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" failed" error="failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:40.707061 kubelet[2197]: E0515 01:15:40.706904 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:40.707061 kubelet[2197]: E0515 01:15:40.706944 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733"} May 15 01:15:40.707061 kubelet[2197]: E0515 01:15:40.706965 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e0cc1c0-23db-422e-a082-8c150da20907\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:40.707061 kubelet[2197]: E0515 01:15:40.706979 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e0cc1c0-23db-422e-a082-8c150da20907\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-f8grq" podUID="8e0cc1c0-23db-422e-a082-8c150da20907" May 15 01:15:42.689743 env[1250]: time="2025-05-15T01:15:42.689696247Z" level=info msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" May 15 01:15:42.690705 env[1250]: time="2025-05-15T01:15:42.690648840Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:15:42.712578 env[1250]: time="2025-05-15T01:15:42.712544350Z" level=error msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" failed" error="failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:42.712861 kubelet[2197]: E0515 01:15:42.712832 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:42.713049 kubelet[2197]: E0515 01:15:42.712868 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480"} May 15 01:15:42.713049 kubelet[2197]: E0515 01:15:42.712900 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:42.713049 kubelet[2197]: E0515 01:15:42.712916 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" podUID="ed686bf6-5f57-4483-afab-6f79b9da741f" May 15 01:15:42.719272 env[1250]: time="2025-05-15T01:15:42.719238249Z" level=error msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" failed" error="failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:42.720100 kubelet[2197]: E0515 01:15:42.719588 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:42.720100 kubelet[2197]: E0515 01:15:42.719628 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53"} May 15 01:15:42.720100 kubelet[2197]: E0515 01:15:42.719650 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8907c9d9-e315-4aa9-8a30-55983de20102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:42.720100 kubelet[2197]: E0515 01:15:42.719663 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8907c9d9-e315-4aa9-8a30-55983de20102\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" podUID="8907c9d9-e315-4aa9-8a30-55983de20102" May 15 01:15:43.690022 env[1250]: time="2025-05-15T01:15:43.689997778Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:15:43.709124 env[1250]: time="2025-05-15T01:15:43.709088763Z" level=error msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" failed" error="failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:43.709898 kubelet[2197]: E0515 01:15:43.709802 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:43.709898 kubelet[2197]: E0515 01:15:43.709831 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a"} May 15 01:15:43.709898 kubelet[2197]: E0515 01:15:43.709851 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6cf49426-ffa5-4b87-a387-036978b1ee62\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:43.709898 kubelet[2197]: E0515 01:15:43.709876 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6cf49426-ffa5-4b87-a387-036978b1ee62\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" podUID="6cf49426-ffa5-4b87-a387-036978b1ee62" May 15 01:15:43.760966 env[1250]: time="2025-05-15T01:15:43.760939000Z" level=info msg="StopContainer for \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\" with timeout 300 (s)" May 15 01:15:43.761419 env[1250]: time="2025-05-15T01:15:43.761405783Z" level=info msg="Stop container \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\" with signal terminated" May 15 01:15:43.813226 systemd[1]: cri-containerd-73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b.scope: Deactivated successfully. May 15 01:15:43.812000 audit: BPF prog-id=126 op=UNLOAD May 15 01:15:43.815593 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 01:15:43.815661 kernel: audit: type=1334 audit(1747271743.812:1042): prog-id=126 op=UNLOAD May 15 01:15:43.817000 audit: BPF prog-id=129 op=UNLOAD May 15 01:15:43.819742 kernel: audit: type=1334 audit(1747271743.817:1043): prog-id=129 op=UNLOAD May 15 01:15:43.836998 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b-rootfs.mount: Deactivated successfully. May 15 01:15:43.839974 env[1250]: time="2025-05-15T01:15:43.839950491Z" level=info msg="StopPodSandbox for \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\"" May 15 01:15:43.841211 env[1250]: time="2025-05-15T01:15:43.841187980Z" level=info msg="Container to stop \"6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 01:15:43.841307 env[1250]: time="2025-05-15T01:15:43.841291028Z" level=info msg="Container to stop \"8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 01:15:43.841365 env[1250]: time="2025-05-15T01:15:43.841347959Z" level=info msg="Container to stop \"c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 01:15:43.842865 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265-shm.mount: Deactivated successfully. May 15 01:15:43.849000 audit: BPF prog-id=122 op=UNLOAD May 15 01:15:43.849610 systemd[1]: cri-containerd-2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265.scope: Deactivated successfully. May 15 01:15:43.851732 kernel: audit: type=1334 audit(1747271743.849:1044): prog-id=122 op=UNLOAD May 15 01:15:43.851000 audit: BPF prog-id=125 op=UNLOAD May 15 01:15:43.853735 kernel: audit: type=1334 audit(1747271743.851:1045): prog-id=125 op=UNLOAD May 15 01:15:43.861445 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265-rootfs.mount: Deactivated successfully. May 15 01:15:43.875342 env[1250]: time="2025-05-15T01:15:43.875313341Z" level=info msg="shim disconnected" id=73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b May 15 01:15:43.875555 env[1250]: time="2025-05-15T01:15:43.875541263Z" level=warning msg="cleaning up after shim disconnected" id=73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b namespace=k8s.io May 15 01:15:43.875637 env[1250]: time="2025-05-15T01:15:43.875626858Z" level=info msg="cleaning up dead shim" May 15 01:15:43.876007 env[1250]: time="2025-05-15T01:15:43.875510100Z" level=info msg="shim disconnected" id=2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265 May 15 01:15:43.876007 env[1250]: time="2025-05-15T01:15:43.875959946Z" level=warning msg="cleaning up after shim disconnected" id=2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265 namespace=k8s.io May 15 01:15:43.876007 env[1250]: time="2025-05-15T01:15:43.875966848Z" level=info msg="cleaning up dead shim" May 15 01:15:43.883000 audit[3912]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:43.883000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc48736a0 a2=0 a3=7ffcc487368c items=0 ppid=2330 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:43.889736 kernel: audit: type=1325 audit(1747271743.883:1046): table=filter:97 family=2 entries=16 op=nft_register_rule pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:43.889785 kernel: audit: type=1300 audit(1747271743.883:1046): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc48736a0 a2=0 a3=7ffcc487368c items=0 ppid=2330 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:43.889810 kernel: audit: type=1327 audit(1747271743.883:1046): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:43.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:43.892088 env[1250]: time="2025-05-15T01:15:43.892051305Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3930 runtime=io.containerd.runc.v2\n" May 15 01:15:43.893133 env[1250]: time="2025-05-15T01:15:43.893107775Z" level=info msg="StopContainer for \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\" returns successfully" May 15 01:15:43.893484 env[1250]: time="2025-05-15T01:15:43.893465788Z" level=info msg="StopPodSandbox for \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\"" May 15 01:15:43.893584 env[1250]: time="2025-05-15T01:15:43.893570295Z" level=info msg="Container to stop \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 01:15:43.895097 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533-shm.mount: Deactivated successfully. May 15 01:15:43.896982 env[1250]: time="2025-05-15T01:15:43.896963773Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3931 runtime=io.containerd.runc.v2\n" May 15 01:15:43.897495 env[1250]: time="2025-05-15T01:15:43.897478296Z" level=info msg="TearDown network for sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" successfully" May 15 01:15:43.897582 env[1250]: time="2025-05-15T01:15:43.897566922Z" level=info msg="StopPodSandbox for \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" returns successfully" May 15 01:15:43.899000 audit[3912]: NETFILTER_CFG table=nat:98 family=2 entries=22 op=nft_register_rule pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:43.902734 kernel: audit: type=1325 audit(1747271743.899:1047): table=nat:98 family=2 entries=22 op=nft_register_rule pid=3912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:43.899000 audit[3912]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcc48736a0 a2=0 a3=7ffcc487368c items=0 ppid=2330 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:43.910813 kernel: audit: type=1300 audit(1747271743.899:1047): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcc48736a0 a2=0 a3=7ffcc487368c items=0 ppid=2330 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:43.910908 kernel: audit: type=1327 audit(1747271743.899:1047): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:43.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:43.913142 systemd[1]: cri-containerd-c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533.scope: Deactivated successfully. May 15 01:15:43.912000 audit: BPF prog-id=118 op=UNLOAD May 15 01:15:43.918000 audit: BPF prog-id=121 op=UNLOAD May 15 01:15:43.926997 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533-rootfs.mount: Deactivated successfully. May 15 01:15:43.932627 env[1250]: time="2025-05-15T01:15:43.932093184Z" level=info msg="shim disconnected" id=c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533 May 15 01:15:43.932627 env[1250]: time="2025-05-15T01:15:43.932135339Z" level=warning msg="cleaning up after shim disconnected" id=c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533 namespace=k8s.io May 15 01:15:43.932627 env[1250]: time="2025-05-15T01:15:43.932142801Z" level=info msg="cleaning up dead shim" May 15 01:15:43.942264 env[1250]: time="2025-05-15T01:15:43.942158358Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3974 runtime=io.containerd.runc.v2\n" May 15 01:15:43.943630 env[1250]: time="2025-05-15T01:15:43.942903683Z" level=info msg="TearDown network for sandbox \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\" successfully" May 15 01:15:43.943630 env[1250]: time="2025-05-15T01:15:43.942938944Z" level=info msg="StopPodSandbox for \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\" returns successfully" May 15 01:15:43.960018 kubelet[2197]: I0515 01:15:43.959993 2197 topology_manager.go:215] "Topology Admit Handler" podUID="5a4e3601-b4b5-4a95-8174-e4773333e67d" podNamespace="calico-system" podName="calico-node-rrg4s" May 15 01:15:43.964494 kubelet[2197]: E0515 01:15:43.964471 2197 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" containerName="calico-node" May 15 01:15:43.964494 kubelet[2197]: E0515 01:15:43.964488 2197 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" containerName="calico-node" May 15 01:15:43.964494 kubelet[2197]: E0515 01:15:43.964492 2197 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="8a72ee40-3128-459f-9fd7-e4b76016161c" containerName="calico-typha" May 15 01:15:43.964494 kubelet[2197]: E0515 01:15:43.964496 2197 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" containerName="flexvol-driver" May 15 01:15:43.964494 kubelet[2197]: E0515 01:15:43.964500 2197 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" containerName="install-cni" May 15 01:15:43.964792 kubelet[2197]: I0515 01:15:43.964523 2197 memory_manager.go:354] "RemoveStaleState removing state" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" containerName="calico-node" May 15 01:15:43.964792 kubelet[2197]: I0515 01:15:43.964530 2197 memory_manager.go:354] "RemoveStaleState removing state" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" containerName="calico-node" May 15 01:15:43.964792 kubelet[2197]: I0515 01:15:43.964533 2197 memory_manager.go:354] "RemoveStaleState removing state" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" containerName="calico-node" May 15 01:15:43.964792 kubelet[2197]: I0515 01:15:43.964536 2197 memory_manager.go:354] "RemoveStaleState removing state" podUID="8a72ee40-3128-459f-9fd7-e4b76016161c" containerName="calico-typha" May 15 01:15:43.964792 kubelet[2197]: E0515 01:15:43.964552 2197 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" containerName="calico-node" May 15 01:15:43.976000 audit[3987]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=3987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:43.976000 audit[3987]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd48a9aef0 a2=0 a3=7ffd48a9aedc items=0 ppid=2330 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:43.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:43.981000 audit[3987]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_unregister_chain pid=3987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:43.981000 audit[3987]: SYSCALL arch=c000003e syscall=46 success=yes exit=2956 a0=3 a1=7ffd48a9aef0 a2=0 a3=0 items=0 ppid=2330 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:43.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:43.994382 systemd[1]: Created slice kubepods-besteffort-pod5a4e3601_b4b5_4a95_8174_e4773333e67d.slice. May 15 01:15:44.006796 kubelet[2197]: I0515 01:15:44.006770 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8a72ee40-3128-459f-9fd7-e4b76016161c-tigera-ca-bundle\") pod \"8a72ee40-3128-459f-9fd7-e4b76016161c\" (UID: \"8a72ee40-3128-459f-9fd7-e4b76016161c\") " May 15 01:15:44.006796 kubelet[2197]: I0515 01:15:44.006793 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-xtables-lock\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.006945 kubelet[2197]: I0515 01:15:44.006806 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-ws44x\" (UniqueName: \"kubernetes.io/projected/8a72ee40-3128-459f-9fd7-e4b76016161c-kube-api-access-ws44x\") pod \"8a72ee40-3128-459f-9fd7-e4b76016161c\" (UID: \"8a72ee40-3128-459f-9fd7-e4b76016161c\") " May 15 01:15:44.006945 kubelet[2197]: I0515 01:15:44.006817 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5305068c-3ee8-4fbf-840b-60831f04fb00-node-certs\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.006945 kubelet[2197]: I0515 01:15:44.006827 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-policysync\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.006945 kubelet[2197]: I0515 01:15:44.006844 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-bin-dir\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.006945 kubelet[2197]: I0515 01:15:44.006862 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5305068c-3ee8-4fbf-840b-60831f04fb00-tigera-ca-bundle\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.006945 kubelet[2197]: I0515 01:15:44.006878 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-lib-modules\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.007110 kubelet[2197]: I0515 01:15:44.006894 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8a72ee40-3128-459f-9fd7-e4b76016161c-typha-certs\") pod \"8a72ee40-3128-459f-9fd7-e4b76016161c\" (UID: \"8a72ee40-3128-459f-9fd7-e4b76016161c\") " May 15 01:15:44.007110 kubelet[2197]: I0515 01:15:44.006903 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-net-dir\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.007110 kubelet[2197]: I0515 01:15:44.006913 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-log-dir\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.007110 kubelet[2197]: I0515 01:15:44.006923 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-j8glr\" (UniqueName: \"kubernetes.io/projected/5305068c-3ee8-4fbf-840b-60831f04fb00-kube-api-access-j8glr\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.007110 kubelet[2197]: I0515 01:15:44.006936 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-var-run-calico\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.007110 kubelet[2197]: I0515 01:15:44.006949 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-flexvol-driver-host\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.007259 kubelet[2197]: I0515 01:15:44.006966 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-var-lib-calico\") pod \"5305068c-3ee8-4fbf-840b-60831f04fb00\" (UID: \"5305068c-3ee8-4fbf-840b-60831f04fb00\") " May 15 01:15:44.007259 kubelet[2197]: I0515 01:15:44.007023 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-xtables-lock\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007259 kubelet[2197]: I0515 01:15:44.007045 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-var-lib-calico\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007259 kubelet[2197]: I0515 01:15:44.007065 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5a4e3601-b4b5-4a95-8174-e4773333e67d-node-certs\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007259 kubelet[2197]: I0515 01:15:44.007079 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sxzmz\" (UniqueName: \"kubernetes.io/projected/5a4e3601-b4b5-4a95-8174-e4773333e67d-kube-api-access-sxzmz\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007396 kubelet[2197]: I0515 01:15:44.007095 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5a4e3601-b4b5-4a95-8174-e4773333e67d-tigera-ca-bundle\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007396 kubelet[2197]: I0515 01:15:44.007112 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-cni-bin-dir\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007396 kubelet[2197]: I0515 01:15:44.007129 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-lib-modules\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007396 kubelet[2197]: I0515 01:15:44.007145 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-cni-net-dir\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007396 kubelet[2197]: I0515 01:15:44.007156 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-flexvol-driver-host\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007513 kubelet[2197]: I0515 01:15:44.007167 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-var-run-calico\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007513 kubelet[2197]: I0515 01:15:44.007179 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-policysync\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.007513 kubelet[2197]: I0515 01:15:44.007188 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5a4e3601-b4b5-4a95-8174-e4773333e67d-cni-log-dir\") pod \"calico-node-rrg4s\" (UID: \"5a4e3601-b4b5-4a95-8174-e4773333e67d\") " pod="calico-system/calico-node-rrg4s" May 15 01:15:44.011681 kubelet[2197]: I0515 01:15:44.008148 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.011825 kubelet[2197]: I0515 01:15:44.011741 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.011825 kubelet[2197]: I0515 01:15:44.008398 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.012581 kubelet[2197]: I0515 01:15:44.012563 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.012757 kubelet[2197]: I0515 01:15:44.012741 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-policysync" (OuterVolumeSpecName: "policysync") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.012940 kubelet[2197]: I0515 01:15:44.012928 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.013039 kubelet[2197]: I0515 01:15:44.013022 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.013094 kubelet[2197]: I0515 01:15:44.013055 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.016438 kubelet[2197]: I0515 01:15:44.016414 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 01:15:44.018504 kubelet[2197]: I0515 01:15:44.018477 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/8a72ee40-3128-459f-9fd7-e4b76016161c-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "8a72ee40-3128-459f-9fd7-e4b76016161c" (UID: "8a72ee40-3128-459f-9fd7-e4b76016161c"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 15 01:15:44.023521 kubelet[2197]: I0515 01:15:44.018890 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/8a72ee40-3128-459f-9fd7-e4b76016161c-kube-api-access-ws44x" (OuterVolumeSpecName: "kube-api-access-ws44x") pod "8a72ee40-3128-459f-9fd7-e4b76016161c" (UID: "8a72ee40-3128-459f-9fd7-e4b76016161c"). InnerVolumeSpecName "kube-api-access-ws44x". PluginName "kubernetes.io/projected", VolumeGidValue "" May 15 01:15:44.028528 kubelet[2197]: I0515 01:15:44.028505 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/5305068c-3ee8-4fbf-840b-60831f04fb00-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 15 01:15:44.028652 kubelet[2197]: I0515 01:15:44.028640 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/5305068c-3ee8-4fbf-840b-60831f04fb00-kube-api-access-j8glr" (OuterVolumeSpecName: "kube-api-access-j8glr") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "kube-api-access-j8glr". PluginName "kubernetes.io/projected", VolumeGidValue "" May 15 01:15:44.028723 kubelet[2197]: I0515 01:15:44.028706 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/5305068c-3ee8-4fbf-840b-60831f04fb00-node-certs" (OuterVolumeSpecName: "node-certs") pod "5305068c-3ee8-4fbf-840b-60831f04fb00" (UID: "5305068c-3ee8-4fbf-840b-60831f04fb00"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 15 01:15:44.029161 env[1250]: time="2025-05-15T01:15:44.028918249Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:15:44.030461 kubelet[2197]: I0515 01:15:44.030367 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/8a72ee40-3128-459f-9fd7-e4b76016161c-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "8a72ee40-3128-459f-9fd7-e4b76016161c" (UID: "8a72ee40-3128-459f-9fd7-e4b76016161c"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 15 01:15:44.048005 env[1250]: time="2025-05-15T01:15:44.047937066Z" level=error msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" failed" error="failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:44.048287 kubelet[2197]: E0515 01:15:44.048266 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:44.048379 kubelet[2197]: E0515 01:15:44.048359 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480"} May 15 01:15:44.048472 kubelet[2197]: E0515 01:15:44.048463 2197 kubelet.go:2040] failed to "KillPodSandbox" for "ed686bf6-5f57-4483-afab-6f79b9da741f" with KillPodSandboxError: "rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:44.048540 kubelet[2197]: E0515 01:15:44.048527 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed686bf6-5f57-4483-afab-6f79b9da741f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bdb6bd8f9-8g6q8" podUID="ed686bf6-5f57-4483-afab-6f79b9da741f" May 15 01:15:44.107813 kubelet[2197]: I0515 01:15:44.107791 2197 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-var-lib-calico\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107813 kubelet[2197]: I0515 01:15:44.107808 2197 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8a72ee40-3128-459f-9fd7-e4b76016161c-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107813 kubelet[2197]: I0515 01:15:44.107814 2197 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-xtables-lock\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107813 kubelet[2197]: I0515 01:15:44.107819 2197 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-ws44x\" (UniqueName: \"kubernetes.io/projected/8a72ee40-3128-459f-9fd7-e4b76016161c-kube-api-access-ws44x\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107975 kubelet[2197]: I0515 01:15:44.107825 2197 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-policysync\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107975 kubelet[2197]: I0515 01:15:44.107830 2197 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107975 kubelet[2197]: I0515 01:15:44.107835 2197 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-lib-modules\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107975 kubelet[2197]: I0515 01:15:44.107840 2197 reconciler_common.go:289] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8a72ee40-3128-459f-9fd7-e4b76016161c-typha-certs\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107975 kubelet[2197]: I0515 01:15:44.107844 2197 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-net-dir\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107975 kubelet[2197]: I0515 01:15:44.107849 2197 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-cni-log-dir\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107975 kubelet[2197]: I0515 01:15:44.107854 2197 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-j8glr\" (UniqueName: \"kubernetes.io/projected/5305068c-3ee8-4fbf-840b-60831f04fb00-kube-api-access-j8glr\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.107975 kubelet[2197]: I0515 01:15:44.107859 2197 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.108198 kubelet[2197]: I0515 01:15:44.107864 2197 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5305068c-3ee8-4fbf-840b-60831f04fb00-var-run-calico\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.108198 kubelet[2197]: I0515 01:15:44.107869 2197 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5305068c-3ee8-4fbf-840b-60831f04fb00-node-certs\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.108198 kubelet[2197]: I0515 01:15:44.107874 2197 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5305068c-3ee8-4fbf-840b-60831f04fb00-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 15 01:15:44.296912 env[1250]: time="2025-05-15T01:15:44.296829364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rrg4s,Uid:5a4e3601-b4b5-4a95-8174-e4773333e67d,Namespace:calico-system,Attempt:0,}" May 15 01:15:44.305648 env[1250]: time="2025-05-15T01:15:44.305600196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:15:44.305817 env[1250]: time="2025-05-15T01:15:44.305654411Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:15:44.305817 env[1250]: time="2025-05-15T01:15:44.305672588Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:15:44.305817 env[1250]: time="2025-05-15T01:15:44.305778547Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a pid=4021 runtime=io.containerd.runc.v2 May 15 01:15:44.315661 systemd[1]: Started cri-containerd-bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a.scope. May 15 01:15:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.323000 audit: BPF prog-id=145 op=LOAD May 15 01:15:44.324000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4021 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261623563366664616135373565646263383632356530323437363433 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4021 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261623563366664616135373565646263383632356530323437363433 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.324000 audit: BPF prog-id=146 op=LOAD May 15 01:15:44.324000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020e660 items=0 ppid=4021 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261623563366664616135373565646263383632356530323437363433 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.325000 audit: BPF prog-id=147 op=LOAD May 15 01:15:44.325000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020e6a8 items=0 ppid=4021 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261623563366664616135373565646263383632356530323437363433 May 15 01:15:44.325000 audit: BPF prog-id=147 op=UNLOAD May 15 01:15:44.325000 audit: BPF prog-id=146 op=UNLOAD May 15 01:15:44.326000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { perfmon } for pid=4031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit[4031]: AVC avc: denied { bpf } for pid=4031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.326000 audit: BPF prog-id=148 op=LOAD May 15 01:15:44.326000 audit[4031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020eab8 items=0 ppid=4021 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261623563366664616135373565646263383632356530323437363433 May 15 01:15:44.334011 env[1250]: time="2025-05-15T01:15:44.333987447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rrg4s,Uid:5a4e3601-b4b5-4a95-8174-e4773333e67d,Namespace:calico-system,Attempt:0,} returns sandbox id \"bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a\"" May 15 01:15:44.336325 env[1250]: time="2025-05-15T01:15:44.336300013Z" level=info msg="CreateContainer within sandbox \"bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 01:15:44.383246 kubelet[2197]: I0515 01:15:44.382980 2197 scope.go:117] "RemoveContainer" containerID="c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d" May 15 01:15:44.385610 env[1250]: time="2025-05-15T01:15:44.385028904Z" level=info msg="RemoveContainer for \"c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d\"" May 15 01:15:44.385888 env[1250]: time="2025-05-15T01:15:44.385864219Z" level=info msg="CreateContainer within sandbox \"bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"90014ef456a4778032db0996a02033b191d0431fe208bd69a6f482d5e1f728c8\"" May 15 01:15:44.387137 env[1250]: time="2025-05-15T01:15:44.387088631Z" level=info msg="StartContainer for \"90014ef456a4778032db0996a02033b191d0431fe208bd69a6f482d5e1f728c8\"" May 15 01:15:44.388187 env[1250]: time="2025-05-15T01:15:44.388161248Z" level=info msg="RemoveContainer for \"c572af181f7885b26d53fd2e71877352f0570add29b21fdf93b798acd185d32d\" returns successfully" May 15 01:15:44.388634 kubelet[2197]: I0515 01:15:44.388518 2197 scope.go:117] "RemoveContainer" containerID="6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b" May 15 01:15:44.393445 systemd[1]: Removed slice kubepods-besteffort-pod5305068c_3ee8_4fbf_840b_60831f04fb00.slice. May 15 01:15:44.395790 systemd[1]: Removed slice kubepods-besteffort-pod8a72ee40_3128_459f_9fd7_e4b76016161c.slice. May 15 01:15:44.398008 env[1250]: time="2025-05-15T01:15:44.397984501Z" level=info msg="RemoveContainer for \"6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b\"" May 15 01:15:44.401408 env[1250]: time="2025-05-15T01:15:44.401374444Z" level=info msg="RemoveContainer for \"6e56942617e2b5998ac0c3238ed525006bc6254bf7ffec04f8fb40bf9c35fa4b\" returns successfully" May 15 01:15:44.405973 kubelet[2197]: I0515 01:15:44.405889 2197 scope.go:117] "RemoveContainer" containerID="8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d" May 15 01:15:44.407857 env[1250]: time="2025-05-15T01:15:44.407835508Z" level=info msg="RemoveContainer for \"8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d\"" May 15 01:15:44.421824 systemd[1]: Started cri-containerd-90014ef456a4778032db0996a02033b191d0431fe208bd69a6f482d5e1f728c8.scope. May 15 01:15:44.426235 env[1250]: time="2025-05-15T01:15:44.426210926Z" level=info msg="RemoveContainer for \"8047ea9aeace462fd8c88fb45b658ebcf591ce12c60e54737a43b1d3770fa43d\" returns successfully" May 15 01:15:44.432132 env[1250]: time="2025-05-15T01:15:44.427125476Z" level=info msg="RemoveContainer for \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\"" May 15 01:15:44.432198 kubelet[2197]: I0515 01:15:44.426439 2197 scope.go:117] "RemoveContainer" containerID="73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b" May 15 01:15:44.444937 env[1250]: time="2025-05-15T01:15:44.442728432Z" level=info msg="RemoveContainer for \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\" returns successfully" May 15 01:15:44.445667 kubelet[2197]: I0515 01:15:44.445227 2197 scope.go:117] "RemoveContainer" containerID="73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b" May 15 01:15:44.445667 kubelet[2197]: E0515 01:15:44.445586 2197 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\": not found" containerID="73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b" May 15 01:15:44.445667 kubelet[2197]: I0515 01:15:44.445606 2197 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b"} err="failed to get container status \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\": rpc error: code = NotFound desc = an error occurred when try to find container \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\": not found" May 15 01:15:44.445816 env[1250]: time="2025-05-15T01:15:44.445477657Z" level=error msg="ContainerStatus for \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"73d3eb8095ccf1b8adc1c6ab9b9166fa094fd7061afa82067166c1a9cd67640b\": not found" May 15 01:15:44.446000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4da02aea78 items=0 ppid=4021 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303134656634353661343737383033326462303939366130323033 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.446000 audit: BPF prog-id=149 op=LOAD May 15 01:15:44.446000 audit[4065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0004241e8 items=0 ppid=4021 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303134656634353661343737383033326462303939366130323033 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit: BPF prog-id=150 op=LOAD May 15 01:15:44.447000 audit[4065]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000424238 items=0 ppid=4021 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303134656634353661343737383033326462303939366130323033 May 15 01:15:44.447000 audit: BPF prog-id=150 op=UNLOAD May 15 01:15:44.447000 audit: BPF prog-id=149 op=UNLOAD May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { perfmon } for pid=4065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit[4065]: AVC avc: denied { bpf } for pid=4065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:44.447000 audit: BPF prog-id=151 op=LOAD May 15 01:15:44.447000 audit[4065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0004242c8 items=0 ppid=4021 pid=4065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:44.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303134656634353661343737383033326462303939366130323033 May 15 01:15:44.457749 env[1250]: time="2025-05-15T01:15:44.457706140Z" level=info msg="StartContainer for \"90014ef456a4778032db0996a02033b191d0431fe208bd69a6f482d5e1f728c8\" returns successfully" May 15 01:15:44.536771 systemd[1]: cri-containerd-90014ef456a4778032db0996a02033b191d0431fe208bd69a6f482d5e1f728c8.scope: Deactivated successfully. May 15 01:15:44.540000 audit: BPF prog-id=151 op=UNLOAD May 15 01:15:44.574771 env[1250]: time="2025-05-15T01:15:44.572928701Z" level=info msg="shim disconnected" id=90014ef456a4778032db0996a02033b191d0431fe208bd69a6f482d5e1f728c8 May 15 01:15:44.574771 env[1250]: time="2025-05-15T01:15:44.572962660Z" level=warning msg="cleaning up after shim disconnected" id=90014ef456a4778032db0996a02033b191d0431fe208bd69a6f482d5e1f728c8 namespace=k8s.io May 15 01:15:44.574771 env[1250]: time="2025-05-15T01:15:44.572969504Z" level=info msg="cleaning up dead shim" May 15 01:15:44.579862 env[1250]: time="2025-05-15T01:15:44.579794184Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4105 runtime=io.containerd.runc.v2\n" May 15 01:15:44.840351 systemd[1]: var-lib-kubelet-pods-5305068c\x2d3ee8\x2d4fbf\x2d840b\x2d60831f04fb00-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 15 01:15:44.840589 systemd[1]: var-lib-kubelet-pods-8a72ee40\x2d3128\x2d459f\x2d9fd7\x2de4b76016161c-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 15 01:15:44.840654 systemd[1]: var-lib-kubelet-pods-5305068c\x2d3ee8\x2d4fbf\x2d840b\x2d60831f04fb00-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dj8glr.mount: Deactivated successfully. May 15 01:15:44.840707 systemd[1]: var-lib-kubelet-pods-5305068c\x2d3ee8\x2d4fbf\x2d840b\x2d60831f04fb00-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 15 01:15:44.840766 systemd[1]: var-lib-kubelet-pods-8a72ee40\x2d3128\x2d459f\x2d9fd7\x2de4b76016161c-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 15 01:15:44.840822 systemd[1]: var-lib-kubelet-pods-8a72ee40\x2d3128\x2d459f\x2d9fd7\x2de4b76016161c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dws44x.mount: Deactivated successfully. May 15 01:15:45.220597 kubelet[2197]: I0515 01:15:45.220567 2197 topology_manager.go:215] "Topology Admit Handler" podUID="38319c28-1568-4714-b50f-01d6244fecdb" podNamespace="calico-system" podName="calico-typha-f9f6f5f7b-gkwpj" May 15 01:15:45.242151 systemd[1]: Created slice kubepods-besteffort-pod38319c28_1568_4714_b50f_01d6244fecdb.slice. May 15 01:15:45.266000 audit[4123]: NETFILTER_CFG table=filter:101 family=2 entries=18 op=nft_register_rule pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:45.266000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff9ca0dc80 a2=0 a3=7fff9ca0dc6c items=0 ppid=2330 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:45.270000 audit[4123]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:45.270000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff9ca0dc80 a2=0 a3=0 items=0 ppid=2330 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:45.313595 kubelet[2197]: I0515 01:15:45.313562 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/38319c28-1568-4714-b50f-01d6244fecdb-tigera-ca-bundle\") pod \"calico-typha-f9f6f5f7b-gkwpj\" (UID: \"38319c28-1568-4714-b50f-01d6244fecdb\") " pod="calico-system/calico-typha-f9f6f5f7b-gkwpj" May 15 01:15:45.313763 kubelet[2197]: I0515 01:15:45.313596 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/38319c28-1568-4714-b50f-01d6244fecdb-typha-certs\") pod \"calico-typha-f9f6f5f7b-gkwpj\" (UID: \"38319c28-1568-4714-b50f-01d6244fecdb\") " pod="calico-system/calico-typha-f9f6f5f7b-gkwpj" May 15 01:15:45.313763 kubelet[2197]: I0515 01:15:45.313638 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cggxq\" (UniqueName: \"kubernetes.io/projected/38319c28-1568-4714-b50f-01d6244fecdb-kube-api-access-cggxq\") pod \"calico-typha-f9f6f5f7b-gkwpj\" (UID: \"38319c28-1568-4714-b50f-01d6244fecdb\") " pod="calico-system/calico-typha-f9f6f5f7b-gkwpj" May 15 01:15:45.393690 env[1250]: time="2025-05-15T01:15:45.393666831Z" level=info msg="CreateContainer within sandbox \"bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 01:15:45.496832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount745906068.mount: Deactivated successfully. May 15 01:15:45.548180 env[1250]: time="2025-05-15T01:15:45.548148856Z" level=info msg="CreateContainer within sandbox \"bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"73992cfbbf46f5901b7c8f9da6687bff9a8cf53a14bacc61247c3b86a954dc9a\"" May 15 01:15:45.548717 env[1250]: time="2025-05-15T01:15:45.548689225Z" level=info msg="StartContainer for \"73992cfbbf46f5901b7c8f9da6687bff9a8cf53a14bacc61247c3b86a954dc9a\"" May 15 01:15:45.558624 systemd[1]: Started cri-containerd-73992cfbbf46f5901b7c8f9da6687bff9a8cf53a14bacc61247c3b86a954dc9a.scope. May 15 01:15:45.566687 env[1250]: time="2025-05-15T01:15:45.566625146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-f9f6f5f7b-gkwpj,Uid:38319c28-1568-4714-b50f-01d6244fecdb,Namespace:calico-system,Attempt:0,}" May 15 01:15:45.575000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.575000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fbda8349a38 items=0 ppid=4021 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393932636662626634366635393031623763386639646136363837 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit: BPF prog-id=152 op=LOAD May 15 01:15:45.576000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0002cfd58 items=0 ppid=4021 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393932636662626634366635393031623763386639646136363837 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.576000 audit: BPF prog-id=153 op=LOAD May 15 01:15:45.576000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0002cfda8 items=0 ppid=4021 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393932636662626634366635393031623763386639646136363837 May 15 01:15:45.577000 audit: BPF prog-id=153 op=UNLOAD May 15 01:15:45.577000 audit: BPF prog-id=152 op=UNLOAD May 15 01:15:45.577000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.577000 audit: BPF prog-id=154 op=LOAD May 15 01:15:45.577000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0002cfe38 items=0 ppid=4021 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733393932636662626634366635393031623763386639646136363837 May 15 01:15:45.610293 env[1250]: time="2025-05-15T01:15:45.610254236Z" level=info msg="StartContainer for \"73992cfbbf46f5901b7c8f9da6687bff9a8cf53a14bacc61247c3b86a954dc9a\" returns successfully" May 15 01:15:45.637617 env[1250]: time="2025-05-15T01:15:45.637573124Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:15:45.637753 env[1250]: time="2025-05-15T01:15:45.637599409Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:15:45.637753 env[1250]: time="2025-05-15T01:15:45.637608321Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:15:45.637849 env[1250]: time="2025-05-15T01:15:45.637765589Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ae55966fd882252906d9ad6f0c63d78546dc4996b8b5d43dd36c815fc045dc1 pid=4162 runtime=io.containerd.runc.v2 May 15 01:15:45.645161 systemd[1]: Started cri-containerd-6ae55966fd882252906d9ad6f0c63d78546dc4996b8b5d43dd36c815fc045dc1.scope. May 15 01:15:45.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.654000 audit: BPF prog-id=155 op=LOAD May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4162 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653535393636666438383232353239303664396164366630633633 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4162 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653535393636666438383232353239303664396164366630633633 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit: BPF prog-id=156 op=LOAD May 15 01:15:45.655000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003526f0 items=0 ppid=4162 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653535393636666438383232353239303664396164366630633633 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit: BPF prog-id=157 op=LOAD May 15 01:15:45.655000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000352738 items=0 ppid=4162 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653535393636666438383232353239303664396164366630633633 May 15 01:15:45.655000 audit: BPF prog-id=157 op=UNLOAD May 15 01:15:45.655000 audit: BPF prog-id=156 op=UNLOAD May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { perfmon } for pid=4171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:45.655000 audit: BPF prog-id=158 op=LOAD May 15 01:15:45.655000 audit[4171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000352b48 items=0 ppid=4162 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:45.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661653535393636666438383232353239303664396164366630633633 May 15 01:15:45.683292 env[1250]: time="2025-05-15T01:15:45.683264698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-f9f6f5f7b-gkwpj,Uid:38319c28-1568-4714-b50f-01d6244fecdb,Namespace:calico-system,Attempt:0,} returns sandbox id \"6ae55966fd882252906d9ad6f0c63d78546dc4996b8b5d43dd36c815fc045dc1\"" May 15 01:15:45.690004 env[1250]: time="2025-05-15T01:15:45.689974518Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:15:45.691639 env[1250]: time="2025-05-15T01:15:45.691615678Z" level=info msg="CreateContainer within sandbox \"6ae55966fd882252906d9ad6f0c63d78546dc4996b8b5d43dd36c815fc045dc1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 01:15:45.693028 kubelet[2197]: I0515 01:15:45.692998 2197 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="5305068c-3ee8-4fbf-840b-60831f04fb00" path="/var/lib/kubelet/pods/5305068c-3ee8-4fbf-840b-60831f04fb00/volumes" May 15 01:15:45.727828 kubelet[2197]: I0515 01:15:45.727798 2197 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="8a72ee40-3128-459f-9fd7-e4b76016161c" path="/var/lib/kubelet/pods/8a72ee40-3128-459f-9fd7-e4b76016161c/volumes" May 15 01:15:45.739030 env[1250]: time="2025-05-15T01:15:45.738996113Z" level=error msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" failed" error="failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:45.739370 kubelet[2197]: E0515 01:15:45.739256 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:45.739370 kubelet[2197]: E0515 01:15:45.739295 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175"} May 15 01:15:45.739370 kubelet[2197]: E0515 01:15:45.739325 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d8a122ac-2bdd-49bc-8377-b156b680505d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:45.739370 kubelet[2197]: E0515 01:15:45.739340 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d8a122ac-2bdd-49bc-8377-b156b680505d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" podUID="d8a122ac-2bdd-49bc-8377-b156b680505d" May 15 01:15:45.969990 env[1250]: time="2025-05-15T01:15:45.969947828Z" level=info msg="CreateContainer within sandbox \"6ae55966fd882252906d9ad6f0c63d78546dc4996b8b5d43dd36c815fc045dc1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d27a2dfa857412c6b15e3aaa0aaff07320e1d42037ac1fa99d0c8c2804176e75\"" May 15 01:15:45.970438 env[1250]: time="2025-05-15T01:15:45.970421045Z" level=info msg="StartContainer for \"d27a2dfa857412c6b15e3aaa0aaff07320e1d42037ac1fa99d0c8c2804176e75\"" May 15 01:15:45.989160 systemd[1]: run-containerd-runc-k8s.io-d27a2dfa857412c6b15e3aaa0aaff07320e1d42037ac1fa99d0c8c2804176e75-runc.ntpuwd.mount: Deactivated successfully. May 15 01:15:45.990880 systemd[1]: Started cri-containerd-d27a2dfa857412c6b15e3aaa0aaff07320e1d42037ac1fa99d0c8c2804176e75.scope. May 15 01:15:46.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.003000 audit: BPF prog-id=159 op=LOAD May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4162 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:46.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376132646661383537343132633662313565336161613061616666 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4162 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:46.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376132646661383537343132633662313565336161613061616666 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit: BPF prog-id=160 op=LOAD May 15 01:15:46.005000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e7e20 items=0 ppid=4162 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:46.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376132646661383537343132633662313565336161613061616666 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit: BPF prog-id=161 op=LOAD May 15 01:15:46.005000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e7e68 items=0 ppid=4162 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:46.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376132646661383537343132633662313565336161613061616666 May 15 01:15:46.005000 audit: BPF prog-id=161 op=UNLOAD May 15 01:15:46.005000 audit: BPF prog-id=160 op=UNLOAD May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:46.005000 audit: BPF prog-id=162 op=LOAD May 15 01:15:46.005000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000340278 items=0 ppid=4162 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:46.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376132646661383537343132633662313565336161613061616666 May 15 01:15:46.036923 env[1250]: time="2025-05-15T01:15:46.036887519Z" level=info msg="StartContainer for \"d27a2dfa857412c6b15e3aaa0aaff07320e1d42037ac1fa99d0c8c2804176e75\" returns successfully" May 15 01:15:46.421962 kubelet[2197]: I0515 01:15:46.419191 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-f9f6f5f7b-gkwpj" podStartSLOduration=3.415662894 podStartE2EDuration="3.415662894s" podCreationTimestamp="2025-05-15 01:15:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:15:46.415625479 +0000 UTC m=+82.844842546" watchObservedRunningTime="2025-05-15 01:15:46.415662894 +0000 UTC m=+82.844879966" May 15 01:15:47.471000 audit[4261]: NETFILTER_CFG table=filter:103 family=2 entries=17 op=nft_register_rule pid=4261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:47.471000 audit[4261]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe5354bbd0 a2=0 a3=7ffe5354bbbc items=0 ppid=2330 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:47.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:47.475000 audit[4261]: NETFILTER_CFG table=nat:104 family=2 entries=19 op=nft_register_chain pid=4261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:47.475000 audit[4261]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe5354bbd0 a2=0 a3=7ffe5354bbbc items=0 ppid=2330 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:47.475000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:47.690382 env[1250]: time="2025-05-15T01:15:47.689791557Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:15:47.726288 env[1250]: time="2025-05-15T01:15:47.725941178Z" level=error msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" failed" error="failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 01:15:47.726551 kubelet[2197]: E0515 01:15:47.726502 2197 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:15:47.729805 kubelet[2197]: E0515 01:15:47.726557 2197 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd"} May 15 01:15:47.729805 kubelet[2197]: E0515 01:15:47.726580 2197 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 01:15:47.729805 kubelet[2197]: E0515 01:15:47.726594 2197 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wtmff" podUID="cb8fa4fa-c090-4fc9-9efe-29e402cdd32f" May 15 01:15:49.773394 env[1250]: time="2025-05-15T01:15:49.773352511Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 15 01:15:49.775554 systemd[1]: cri-containerd-73992cfbbf46f5901b7c8f9da6687bff9a8cf53a14bacc61247c3b86a954dc9a.scope: Deactivated successfully. May 15 01:15:49.781855 kernel: kauditd_printk_skb: 278 callbacks suppressed May 15 01:15:49.781972 kernel: audit: type=1334 audit(1747271749.779:1123): prog-id=154 op=UNLOAD May 15 01:15:49.779000 audit: BPF prog-id=154 op=UNLOAD May 15 01:15:49.793091 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-73992cfbbf46f5901b7c8f9da6687bff9a8cf53a14bacc61247c3b86a954dc9a-rootfs.mount: Deactivated successfully. May 15 01:15:49.799074 env[1250]: time="2025-05-15T01:15:49.799045504Z" level=info msg="shim disconnected" id=73992cfbbf46f5901b7c8f9da6687bff9a8cf53a14bacc61247c3b86a954dc9a May 15 01:15:49.799211 env[1250]: time="2025-05-15T01:15:49.799198327Z" level=warning msg="cleaning up after shim disconnected" id=73992cfbbf46f5901b7c8f9da6687bff9a8cf53a14bacc61247c3b86a954dc9a namespace=k8s.io May 15 01:15:49.799264 env[1250]: time="2025-05-15T01:15:49.799253370Z" level=info msg="cleaning up dead shim" May 15 01:15:49.804533 env[1250]: time="2025-05-15T01:15:49.804499449Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:15:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4294 runtime=io.containerd.runc.v2\n" May 15 01:15:50.421785 env[1250]: time="2025-05-15T01:15:50.421757600Z" level=info msg="CreateContainer within sandbox \"bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 01:15:50.428797 env[1250]: time="2025-05-15T01:15:50.428763787Z" level=info msg="CreateContainer within sandbox \"bab5c6fdaa575edbc8625e02476431b8bd6d2dc7a83b46c36e62fab552c7b43a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e6349d47b483e82c28056ce77a1820e0269600ad48f42ed4468eca811749074e\"" May 15 01:15:50.429155 env[1250]: time="2025-05-15T01:15:50.429139223Z" level=info msg="StartContainer for \"e6349d47b483e82c28056ce77a1820e0269600ad48f42ed4468eca811749074e\"" May 15 01:15:50.444986 systemd[1]: Started cri-containerd-e6349d47b483e82c28056ce77a1820e0269600ad48f42ed4468eca811749074e.scope. May 15 01:15:50.463724 kernel: audit: type=1400 audit(1747271750.460:1124): avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff95973f1e8 items=0 ppid=4021 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:50.474831 kernel: audit: type=1300 audit(1747271750.460:1124): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff95973f1e8 items=0 ppid=4021 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:50.474877 kernel: audit: type=1327 audit(1747271750.460:1124): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333439643437623438336538326332383035366365373761313832 May 15 01:15:50.474895 kernel: audit: type=1400 audit(1747271750.460:1125): avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333439643437623438336538326332383035366365373761313832 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.480042 kernel: audit: type=1400 audit(1747271750.460:1125): avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.480097 kernel: audit: type=1400 audit(1747271750.460:1125): avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.482737 kernel: audit: type=1400 audit(1747271750.460:1125): avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.485613 kernel: audit: type=1400 audit(1747271750.460:1125): avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.460000 audit: BPF prog-id=163 op=LOAD May 15 01:15:50.460000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002d9ba8 items=0 ppid=4021 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:50.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333439643437623438336538326332383035366365373761313832 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.488749 kernel: audit: type=1400 audit(1747271750.460:1125): avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit: BPF prog-id=164 op=LOAD May 15 01:15:50.463000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002d9bf8 items=0 ppid=4021 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:50.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333439643437623438336538326332383035366365373761313832 May 15 01:15:50.463000 audit: BPF prog-id=164 op=UNLOAD May 15 01:15:50.463000 audit: BPF prog-id=163 op=UNLOAD May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { perfmon } for pid=4317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit[4317]: AVC avc: denied { bpf } for pid=4317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:50.463000 audit: BPF prog-id=165 op=LOAD May 15 01:15:50.463000 audit[4317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002d9c88 items=0 ppid=4021 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:50.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536333439643437623438336538326332383035366365373761313832 May 15 01:15:50.507844 env[1250]: time="2025-05-15T01:15:50.507814798Z" level=info msg="StartContainer for \"e6349d47b483e82c28056ce77a1820e0269600ad48f42ed4468eca811749074e\" returns successfully" May 15 01:15:51.419261 systemd[1]: run-containerd-runc-k8s.io-e6349d47b483e82c28056ce77a1820e0269600ad48f42ed4468eca811749074e-runc.z4TEM5.mount: Deactivated successfully. May 15 01:15:52.419310 systemd[1]: run-containerd-runc-k8s.io-e6349d47b483e82c28056ce77a1820e0269600ad48f42ed4468eca811749074e-runc.NXRgRh.mount: Deactivated successfully. May 15 01:15:52.689029 env[1250]: time="2025-05-15T01:15:52.688954241Z" level=info msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" May 15 01:15:52.809000 audit[4486]: AVC avc: denied { write } for pid=4486 comm="tee" name="fd" dev="proc" ino=39372 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 01:15:52.809000 audit[4486]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7eef7a2e a2=241 a3=1b6 items=1 ppid=4431 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:52.809000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 01:15:52.809000 audit: PATH item=0 name="/dev/fd/63" inode=38373 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:15:52.809000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 01:15:52.820000 audit[4510]: AVC avc: denied { write } for pid=4510 comm="tee" name="fd" dev="proc" ino=38396 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 01:15:52.820000 audit[4510]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4100ba2e a2=241 a3=1b6 items=1 ppid=4425 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:52.820000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 01:15:52.820000 audit: PATH item=0 name="/dev/fd/63" inode=38393 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:15:52.820000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 01:15:52.823000 audit[4498]: AVC avc: denied { write } for pid=4498 comm="tee" name="fd" dev="proc" ino=38400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 01:15:52.823000 audit[4498]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc447ca1f a2=241 a3=1b6 items=1 ppid=4430 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:52.823000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 01:15:52.823000 audit: PATH item=0 name="/dev/fd/63" inode=38381 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:15:52.823000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 01:15:52.825000 audit[4501]: AVC avc: denied { write } for pid=4501 comm="tee" name="fd" dev="proc" ino=38404 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 01:15:52.825000 audit[4501]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3b36fa2f a2=241 a3=1b6 items=1 ppid=4422 pid=4501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:52.825000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 01:15:52.825000 audit: PATH item=0 name="/dev/fd/63" inode=38386 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:15:52.825000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 01:15:52.827000 audit[4503]: AVC avc: denied { write } for pid=4503 comm="tee" name="fd" dev="proc" ino=38408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 01:15:52.827000 audit[4503]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde3f44a1e a2=241 a3=1b6 items=1 ppid=4429 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:52.827000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 01:15:52.827000 audit: PATH item=0 name="/dev/fd/63" inode=39369 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:15:52.827000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 01:15:52.841000 audit[4505]: AVC avc: denied { write } for pid=4505 comm="tee" name="fd" dev="proc" ino=38412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 01:15:52.841000 audit[4505]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffacccfa2e a2=241 a3=1b6 items=1 ppid=4432 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:52.841000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 01:15:52.841000 audit: PATH item=0 name="/dev/fd/63" inode=38391 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:15:52.841000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 01:15:52.842000 audit[4507]: AVC avc: denied { write } for pid=4507 comm="tee" name="fd" dev="proc" ino=38416 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 01:15:52.842000 audit[4507]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea308ca30 a2=241 a3=1b6 items=1 ppid=4424 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:52.842000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 01:15:52.842000 audit: PATH item=0 name="/dev/fd/63" inode=38392 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 01:15:52.842000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 01:15:52.968218 kubelet[2197]: I0515 01:15:52.966235 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rrg4s" podStartSLOduration=9.963709088 podStartE2EDuration="9.963709088s" podCreationTimestamp="2025-05-15 01:15:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:15:51.511055068 +0000 UTC m=+87.940272140" watchObservedRunningTime="2025-05-15 01:15:52.963709088 +0000 UTC m=+89.392926154" May 15 01:15:53.098000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.098000 audit: BPF prog-id=166 op=LOAD May 15 01:15:53.098000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe888fa600 a2=98 a3=3 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.100000 audit: BPF prog-id=166 op=UNLOAD May 15 01:15:53.104000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.104000 audit: BPF prog-id=167 op=LOAD May 15 01:15:53.104000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe888fa3e0 a2=74 a3=540051 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.104000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.105000 audit: BPF prog-id=167 op=UNLOAD May 15 01:15:53.105000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.105000 audit: BPF prog-id=168 op=LOAD May 15 01:15:53.105000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe888fa410 a2=94 a3=2 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.105000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.105000 audit: BPF prog-id=168 op=UNLOAD May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:52.959 [INFO][4492] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:52.959 [INFO][4492] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" iface="eth0" netns="/var/run/netns/cni-820ef391-1224-81d4-b861-6e1042957f3e" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:52.959 [INFO][4492] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" iface="eth0" netns="/var/run/netns/cni-820ef391-1224-81d4-b861-6e1042957f3e" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:52.960 [INFO][4492] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" iface="eth0" netns="/var/run/netns/cni-820ef391-1224-81d4-b861-6e1042957f3e" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:52.960 [INFO][4492] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:52.960 [INFO][4492] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:53.095 [INFO][4525] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:53.096 [INFO][4525] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:53.096 [INFO][4525] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:53.107 [WARNING][4525] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:53.107 [INFO][4525] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:53.108 [INFO][4525] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:53.110908 env[1250]: 2025-05-15 01:15:53.109 [INFO][4492] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:15:53.112614 systemd[1]: run-netns-cni\x2d820ef391\x2d1224\x2d81d4\x2db861\x2d6e1042957f3e.mount: Deactivated successfully. May 15 01:15:53.112916 env[1250]: time="2025-05-15T01:15:53.112701279Z" level=info msg="TearDown network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" successfully" May 15 01:15:53.112916 env[1250]: time="2025-05-15T01:15:53.112730279Z" level=info msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" returns successfully" May 15 01:15:53.113806 env[1250]: time="2025-05-15T01:15:53.113790773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-nvxb8,Uid:13a79e40-372b-4208-b918-f3767f012b11,Namespace:kube-system,Attempt:1,}" May 15 01:15:53.196000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit: BPF prog-id=169 op=LOAD May 15 01:15:53.196000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe888fa2d0 a2=40 a3=1 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.196000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.196000 audit: BPF prog-id=169 op=UNLOAD May 15 01:15:53.196000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.196000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe888fa3a0 a2=50 a3=7ffe888fa480 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.196000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe888fa2e0 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe888fa310 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe888fa220 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe888fa330 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe888fa310 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe888fa300 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe888fa330 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe888fa310 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe888fa330 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe888fa300 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.203000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.203000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe888fa370 a2=28 a3=0 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.203000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe888fa120 a2=50 a3=1 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit: BPF prog-id=170 op=LOAD May 15 01:15:53.204000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe888fa120 a2=94 a3=5 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.204000 audit: BPF prog-id=170 op=UNLOAD May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe888fa1d0 a2=50 a3=1 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe888fa2f0 a2=4 a3=38 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { confidentiality } for pid=4560 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 01:15:53.204000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe888fa340 a2=94 a3=6 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { confidentiality } for pid=4560 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 01:15:53.204000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe888f9af0 a2=94 a3=83 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.204000 audit[4560]: AVC avc: denied { confidentiality } for pid=4560 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 01:15:53.204000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe888f9af0 a2=94 a3=83 items=0 ppid=4427 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 01:15:53.250000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.250000 audit: BPF prog-id=171 op=LOAD May 15 01:15:53.250000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff622f2f00 a2=98 a3=1999999999999999 items=0 ppid=4427 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.250000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 01:15:53.251000 audit: BPF prog-id=171 op=UNLOAD May 15 01:15:53.251000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit: BPF prog-id=172 op=LOAD May 15 01:15:53.251000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff622f2de0 a2=74 a3=ffff items=0 ppid=4427 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.251000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 01:15:53.251000 audit: BPF prog-id=172 op=UNLOAD May 15 01:15:53.251000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.251000 audit: BPF prog-id=173 op=LOAD May 15 01:15:53.251000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff622f2e20 a2=40 a3=7fff622f3000 items=0 ppid=4427 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.251000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 01:15:53.251000 audit: BPF prog-id=173 op=UNLOAD May 15 01:15:53.258778 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib78adc870f0: link becomes ready May 15 01:15:53.267915 systemd-networkd[1064]: calib78adc870f0: Link UP May 15 01:15:53.268023 systemd-networkd[1064]: calib78adc870f0: Gained carrier May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.153 [INFO][4562] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0 coredns-7db6d8ff4d- kube-system 13a79e40-372b-4208-b918-f3767f012b11 996 0 2025-05-15 01:14:36 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-nvxb8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib78adc870f0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nvxb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--nvxb8-" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.157 [INFO][4562] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nvxb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.221 [INFO][4575] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" HandleID="k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.227 [INFO][4575] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" HandleID="k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004d8de0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-nvxb8", "timestamp":"2025-05-15 01:15:53.221566711 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.227 [INFO][4575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.227 [INFO][4575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.227 [INFO][4575] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.228 [INFO][4575] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.233 [INFO][4575] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.235 [INFO][4575] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.236 [INFO][4575] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.238 [INFO][4575] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.238 [INFO][4575] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.239 [INFO][4575] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15 May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.240 [INFO][4575] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.244 [INFO][4575] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.244 [INFO][4575] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" host="localhost" May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.244 [INFO][4575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:53.270761 env[1250]: 2025-05-15 01:15:53.244 [INFO][4575] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" HandleID="k8s-pod-network.0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.272321 env[1250]: 2025-05-15 01:15:53.246 [INFO][4562] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nvxb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"13a79e40-372b-4208-b918-f3767f012b11", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-nvxb8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib78adc870f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:53.272321 env[1250]: 2025-05-15 01:15:53.246 [INFO][4562] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nvxb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.272321 env[1250]: 2025-05-15 01:15:53.246 [INFO][4562] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib78adc870f0 ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nvxb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.272321 env[1250]: 2025-05-15 01:15:53.258 [INFO][4562] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nvxb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.272321 env[1250]: 2025-05-15 01:15:53.258 [INFO][4562] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nvxb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"13a79e40-372b-4208-b918-f3767f012b11", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15", Pod:"coredns-7db6d8ff4d-nvxb8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib78adc870f0", MAC:"8e:82:2c:6e:b4:cc", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:53.272321 env[1250]: 2025-05-15 01:15:53.267 [INFO][4562] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nvxb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:15:53.296950 env[1250]: time="2025-05-15T01:15:53.296335743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:15:53.297041 env[1250]: time="2025-05-15T01:15:53.296951444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:15:53.297041 env[1250]: time="2025-05-15T01:15:53.296975743Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:15:53.297603 env[1250]: time="2025-05-15T01:15:53.297139535Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15 pid=4616 runtime=io.containerd.runc.v2 May 15 01:15:53.313077 systemd[1]: Started cri-containerd-0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15.scope. May 15 01:15:53.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.326000 audit: BPF prog-id=174 op=LOAD May 15 01:15:53.327000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4616 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383339333361393035653632623331393265643234316635386239 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4616 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383339333361393035653632623331393265643234316635386239 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.327000 audit: BPF prog-id=175 op=LOAD May 15 01:15:53.327000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001fe120 items=0 ppid=4616 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383339333361393035653632623331393265643234316635386239 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.328000 audit: BPF prog-id=176 op=LOAD May 15 01:15:53.328000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001fe168 items=0 ppid=4616 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383339333361393035653632623331393265643234316635386239 May 15 01:15:53.328000 audit: BPF prog-id=176 op=UNLOAD May 15 01:15:53.328000 audit: BPF prog-id=175 op=UNLOAD May 15 01:15:53.329000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { perfmon } for pid=4625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit[4625]: AVC avc: denied { bpf } for pid=4625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.329000 audit: BPF prog-id=177 op=LOAD May 15 01:15:53.329000 audit[4625]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001fe578 items=0 ppid=4616 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065383339333361393035653632623331393265643234316635386239 May 15 01:15:53.330785 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 01:15:53.347723 systemd-networkd[1064]: vxlan.calico: Link UP May 15 01:15:53.347727 systemd-networkd[1064]: vxlan.calico: Gained carrier May 15 01:15:53.363815 env[1250]: time="2025-05-15T01:15:53.363790271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-nvxb8,Uid:13a79e40-372b-4208-b918-f3767f012b11,Namespace:kube-system,Attempt:1,} returns sandbox id \"0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15\"" May 15 01:15:53.397000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.397000 audit: BPF prog-id=178 op=LOAD May 15 01:15:53.397000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffded21ccb0 a2=98 a3=ffffffff items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.397000 audit: BPF prog-id=178 op=UNLOAD May 15 01:15:53.406000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.406000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.406000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.406000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.406000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.406000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.406000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.406000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.409291 env[1250]: time="2025-05-15T01:15:53.408835642Z" level=info msg="CreateContainer within sandbox \"0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 01:15:53.406000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.406000 audit: BPF prog-id=179 op=LOAD May 15 01:15:53.406000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffded21cac0 a2=74 a3=540051 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.411000 audit: BPF prog-id=179 op=UNLOAD May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit: BPF prog-id=180 op=LOAD May 15 01:15:53.411000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffded21caf0 a2=94 a3=2 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.411000 audit: BPF prog-id=180 op=UNLOAD May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffded21c9c0 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffded21c9f0 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffded21c900 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffded21ca10 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffded21c9f0 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.411000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.411000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffded21c9e0 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.411000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffded21ca10 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffded21c9f0 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffded21ca10 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffded21c9e0 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffded21ca50 a2=28 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.412000 audit: BPF prog-id=181 op=LOAD May 15 01:15:53.412000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffded21c8c0 a2=40 a3=0 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.412000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.413000 audit: BPF prog-id=181 op=UNLOAD May 15 01:15:53.421000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.421000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffded21c8b0 a2=50 a3=2800 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffded21c8b0 a2=50 a3=2800 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit: BPF prog-id=182 op=LOAD May 15 01:15:53.429000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffded21c0d0 a2=94 a3=2 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.429000 audit: BPF prog-id=182 op=UNLOAD May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { perfmon } for pid=4667 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit[4667]: AVC avc: denied { bpf } for pid=4667 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.429000 audit: BPF prog-id=183 op=LOAD May 15 01:15:53.429000 audit[4667]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffded21c1d0 a2=94 a3=30 items=0 ppid=4427 pid=4667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.429000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 01:15:53.445702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2505044597.mount: Deactivated successfully. May 15 01:15:53.454061 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1043742681.mount: Deactivated successfully. May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit: BPF prog-id=184 op=LOAD May 15 01:15:53.459000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc682eb0e0 a2=98 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.459000 audit: BPF prog-id=184 op=UNLOAD May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit: BPF prog-id=185 op=LOAD May 15 01:15:53.459000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc682eaec0 a2=74 a3=540051 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.459000 audit: BPF prog-id=185 op=UNLOAD May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.459000 audit: BPF prog-id=186 op=LOAD May 15 01:15:53.459000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc682eaef0 a2=94 a3=2 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.459000 audit: BPF prog-id=186 op=UNLOAD May 15 01:15:53.472757 env[1250]: time="2025-05-15T01:15:53.470346173Z" level=info msg="CreateContainer within sandbox \"0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a31c36749a29ae5dec9d53f6aedb810e3fab8f42067c37ef0a4b2886531e83d0\"" May 15 01:15:53.477545 env[1250]: time="2025-05-15T01:15:53.476235568Z" level=info msg="StartContainer for \"a31c36749a29ae5dec9d53f6aedb810e3fab8f42067c37ef0a4b2886531e83d0\"" May 15 01:15:53.490467 systemd[1]: Started cri-containerd-a31c36749a29ae5dec9d53f6aedb810e3fab8f42067c37ef0a4b2886531e83d0.scope. May 15 01:15:53.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.531000 audit: BPF prog-id=187 op=LOAD May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4616 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133316333363734396132396165356465633964353366366165646238 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4616 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133316333363734396132396165356465633964353366366165646238 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit: BPF prog-id=188 op=LOAD May 15 01:15:53.534000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d2c10 items=0 ppid=4616 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133316333363734396132396165356465633964353366366165646238 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit: BPF prog-id=189 op=LOAD May 15 01:15:53.534000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d2c58 items=0 ppid=4616 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133316333363734396132396165356465633964353366366165646238 May 15 01:15:53.534000 audit: BPF prog-id=189 op=UNLOAD May 15 01:15:53.534000 audit: BPF prog-id=188 op=UNLOAD May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.534000 audit: BPF prog-id=190 op=LOAD May 15 01:15:53.534000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d3068 items=0 ppid=4616 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133316333363734396132396165356465633964353366366165646238 May 15 01:15:53.547627 env[1250]: time="2025-05-15T01:15:53.547601299Z" level=info msg="StartContainer for \"a31c36749a29ae5dec9d53f6aedb810e3fab8f42067c37ef0a4b2886531e83d0\" returns successfully" May 15 01:15:53.580000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.580000 audit: BPF prog-id=191 op=LOAD May 15 01:15:53.580000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc682eadb0 a2=40 a3=1 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.580000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.581000 audit: BPF prog-id=191 op=UNLOAD May 15 01:15:53.581000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.581000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc682eae80 a2=50 a3=7ffc682eaf60 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.581000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc682eadc0 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc682eadf0 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc682ead00 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc682eae10 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc682eadf0 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc682eade0 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc682eae10 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc682eadf0 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc682eae10 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc682eade0 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.588000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.588000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc682eae50 a2=28 a3=0 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.588000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc682eac00 a2=50 a3=1 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.589000 audit: BPF prog-id=192 op=LOAD May 15 01:15:53.589000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc682eac00 a2=94 a3=5 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.589000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.590000 audit: BPF prog-id=192 op=UNLOAD May 15 01:15:53.590000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.590000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc682eacb0 a2=50 a3=1 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.590000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.590000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.590000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc682eadd0 a2=4 a3=38 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.590000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { confidentiality } for pid=4680 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 01:15:53.591000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc682eae20 a2=94 a3=6 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { confidentiality } for pid=4680 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 01:15:53.591000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc682ea5d0 a2=94 a3=83 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.591000 audit[4680]: AVC avc: denied { confidentiality } for pid=4680 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 01:15:53.591000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc682ea5d0 a2=94 a3=83 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.591000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.592000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.592000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc682ec010 a2=10 a3=f1f00800 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.592000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.592000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc682ebeb0 a2=10 a3=3 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.592000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.592000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc682ebe50 a2=10 a3=3 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.592000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:53.592000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc682ebe50 a2=10 a3=7 items=0 ppid=4427 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 01:15:53.602000 audit: BPF prog-id=183 op=UNLOAD May 15 01:15:53.710000 audit[4734]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4734 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:53.710000 audit[4734]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffe10ef580 a2=0 a3=7fffe10ef56c items=0 ppid=4427 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.710000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:53.721000 audit[4733]: NETFILTER_CFG table=raw:106 family=2 entries=21 op=nft_register_chain pid=4733 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:53.721000 audit[4733]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd10c1c9f0 a2=0 a3=7ffd10c1c9dc items=0 ppid=4427 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.721000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:53.731000 audit[4735]: NETFILTER_CFG table=nat:107 family=2 entries=15 op=nft_register_chain pid=4735 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:53.731000 audit[4735]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe56363720 a2=0 a3=7ffe5636370c items=0 ppid=4427 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.731000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:53.732000 audit[4738]: NETFILTER_CFG table=filter:108 family=2 entries=69 op=nft_register_chain pid=4738 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:53.732000 audit[4738]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7ffe0e570be0 a2=0 a3=7ffe0e570bcc items=0 ppid=4427 pid=4738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:53.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:54.699949 kubelet[2197]: I0515 01:15:54.699897 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-nvxb8" podStartSLOduration=78.449380202 podStartE2EDuration="1m18.449380202s" podCreationTimestamp="2025-05-15 01:14:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:15:54.449083182 +0000 UTC m=+90.878300247" watchObservedRunningTime="2025-05-15 01:15:54.449380202 +0000 UTC m=+90.878597269" May 15 01:15:54.706000 audit[4751]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:54.706000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe43cb70c0 a2=0 a3=7ffe43cb70ac items=0 ppid=2330 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:54.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:54.722000 audit[4751]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:54.722000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe43cb70c0 a2=0 a3=7ffe43cb70ac items=0 ppid=2330 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:54.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:54.724846 systemd-networkd[1064]: vxlan.calico: Gained IPv6LL May 15 01:15:54.817378 kernel: kauditd_printk_skb: 669 callbacks suppressed May 15 01:15:54.817461 kernel: audit: type=1325 audit(1747271754.815:1270): table=filter:111 family=2 entries=10 op=nft_register_rule pid=4756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:54.815000 audit[4756]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:54.815000 audit[4756]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd2cb19380 a2=0 a3=7ffd2cb1936c items=0 ppid=2330 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:54.823180 kernel: audit: type=1300 audit(1747271754.815:1270): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd2cb19380 a2=0 a3=7ffd2cb1936c items=0 ppid=2330 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:54.827242 kernel: audit: type=1327 audit(1747271754.815:1270): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:54.829747 kernel: audit: type=1325 audit(1747271754.824:1271): table=nat:112 family=2 entries=20 op=nft_register_rule pid=4756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:54.829772 kernel: audit: type=1300 audit(1747271754.824:1271): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd2cb19380 a2=0 a3=7ffd2cb1936c items=0 ppid=2330 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:54.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:54.824000 audit[4756]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:54.824000 audit[4756]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd2cb19380 a2=0 a3=7ffd2cb1936c items=0 ppid=2330 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:54.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:54.833047 kernel: audit: type=1327 audit(1747271754.824:1271): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:55.108866 systemd-networkd[1064]: calib78adc870f0: Gained IPv6LL May 15 01:15:55.690512 env[1250]: time="2025-05-15T01:15:55.690117815Z" level=info msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" May 15 01:15:55.691164 env[1250]: time="2025-05-15T01:15:55.691146019Z" level=info msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.787 [INFO][4783] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.790 [INFO][4783] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" iface="eth0" netns="/var/run/netns/cni-8658ac06-e094-5279-5c52-e12ce73af4f9" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.791 [INFO][4783] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" iface="eth0" netns="/var/run/netns/cni-8658ac06-e094-5279-5c52-e12ce73af4f9" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.791 [INFO][4783] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" iface="eth0" netns="/var/run/netns/cni-8658ac06-e094-5279-5c52-e12ce73af4f9" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.791 [INFO][4783] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.791 [INFO][4783] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.832 [INFO][4803] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.832 [INFO][4803] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.832 [INFO][4803] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.837 [WARNING][4803] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.837 [INFO][4803] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.841 [INFO][4803] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:55.845542 env[1250]: 2025-05-15 01:15:55.844 [INFO][4783] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:15:55.852303 env[1250]: time="2025-05-15T01:15:55.845691865Z" level=info msg="TearDown network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" successfully" May 15 01:15:55.852303 env[1250]: time="2025-05-15T01:15:55.845725068Z" level=info msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" returns successfully" May 15 01:15:55.852303 env[1250]: time="2025-05-15T01:15:55.847654479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b8cc979fc-pg889,Uid:8907c9d9-e315-4aa9-8a30-55983de20102,Namespace:calico-apiserver,Attempt:1,}" May 15 01:15:55.847102 systemd[1]: run-netns-cni\x2d8658ac06\x2de094\x2d5279\x2d5c52\x2de12ce73af4f9.mount: Deactivated successfully. May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.791 [INFO][4791] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.791 [INFO][4791] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" iface="eth0" netns="/var/run/netns/cni-6ca833ab-880a-2a5d-d4b8-f8dc571ea8af" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.791 [INFO][4791] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" iface="eth0" netns="/var/run/netns/cni-6ca833ab-880a-2a5d-d4b8-f8dc571ea8af" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.792 [INFO][4791] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" iface="eth0" netns="/var/run/netns/cni-6ca833ab-880a-2a5d-d4b8-f8dc571ea8af" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.792 [INFO][4791] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.792 [INFO][4791] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.834 [INFO][4802] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.834 [INFO][4802] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.845 [INFO][4802] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.862 [WARNING][4802] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.862 [INFO][4802] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.864 [INFO][4802] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:55.867107 env[1250]: 2025-05-15 01:15:55.865 [INFO][4791] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:15:55.878830 env[1250]: time="2025-05-15T01:15:55.869363782Z" level=info msg="TearDown network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" successfully" May 15 01:15:55.878830 env[1250]: time="2025-05-15T01:15:55.869389954Z" level=info msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" returns successfully" May 15 01:15:55.878830 env[1250]: time="2025-05-15T01:15:55.869876348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-f8grq,Uid:8e0cc1c0-23db-422e-a082-8c150da20907,Namespace:kube-system,Attempt:1,}" May 15 01:15:55.868680 systemd[1]: run-netns-cni\x2d6ca833ab\x2d880a\x2d2a5d\x2dd4b8\x2df8dc571ea8af.mount: Deactivated successfully. May 15 01:15:56.087380 systemd-networkd[1064]: calia64dafd3141: Link UP May 15 01:15:56.091276 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 01:15:56.091326 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia64dafd3141: link becomes ready May 15 01:15:56.090689 systemd-networkd[1064]: calia64dafd3141: Gained carrier May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.927 [INFO][4814] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0 calico-apiserver-6b8cc979fc- calico-apiserver 8907c9d9-e315-4aa9-8a30-55983de20102 1015 0 2025-05-15 01:14:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b8cc979fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6b8cc979fc-pg889 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia64dafd3141 [] []}} ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-pg889" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.927 [INFO][4814] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-pg889" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.944 [INFO][4827] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" HandleID="k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.959 [INFO][4827] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" HandleID="k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290b20), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6b8cc979fc-pg889", "timestamp":"2025-05-15 01:15:55.94476466 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.959 [INFO][4827] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.960 [INFO][4827] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.960 [INFO][4827] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.960 [INFO][4827] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.992 [INFO][4827] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.995 [INFO][4827] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:55.996 [INFO][4827] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:56.004 [INFO][4827] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:56.009 [INFO][4827] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:56.010 [INFO][4827] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452 May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:56.018 [INFO][4827] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:56.082 [INFO][4827] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:56.082 [INFO][4827] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" host="localhost" May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:56.082 [INFO][4827] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:56.193491 env[1250]: 2025-05-15 01:15:56.082 [INFO][4827] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" HandleID="k8s-pod-network.f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:56.194000 env[1250]: 2025-05-15 01:15:56.084 [INFO][4814] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-pg889" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0", GenerateName:"calico-apiserver-6b8cc979fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"8907c9d9-e315-4aa9-8a30-55983de20102", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b8cc979fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6b8cc979fc-pg889", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia64dafd3141", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:56.194000 env[1250]: 2025-05-15 01:15:56.084 [INFO][4814] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-pg889" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:56.194000 env[1250]: 2025-05-15 01:15:56.084 [INFO][4814] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia64dafd3141 ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-pg889" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:56.194000 env[1250]: 2025-05-15 01:15:56.091 [INFO][4814] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-pg889" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:56.194000 env[1250]: 2025-05-15 01:15:56.091 [INFO][4814] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-pg889" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0", GenerateName:"calico-apiserver-6b8cc979fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"8907c9d9-e315-4aa9-8a30-55983de20102", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b8cc979fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452", Pod:"calico-apiserver-6b8cc979fc-pg889", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia64dafd3141", MAC:"06:86:09:05:93:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:56.194000 env[1250]: 2025-05-15 01:15:56.192 [INFO][4814] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-pg889" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:15:56.237739 env[1250]: time="2025-05-15T01:15:56.237683311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:15:56.237889 env[1250]: time="2025-05-15T01:15:56.237854678Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:15:56.237889 env[1250]: time="2025-05-15T01:15:56.237866415Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:15:56.238324 env[1250]: time="2025-05-15T01:15:56.238208764Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452 pid=4872 runtime=io.containerd.runc.v2 May 15 01:15:56.245567 systemd[1]: Started cri-containerd-f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452.scope. May 15 01:15:56.269006 kernel: audit: type=1400 audit(1747271756.258:1272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.269075 kernel: audit: type=1400 audit(1747271756.258:1273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.269104 kernel: audit: type=1400 audit(1747271756.258:1274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.269120 kernel: audit: type=1400 audit(1747271756.258:1275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.260000 audit: BPF prog-id=193 op=LOAD May 15 01:15:56.261000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4872 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663038313733326366313162373365383538656532313435346663 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4872 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663038313733326366313162373365383538656532313435346663 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.261000 audit: BPF prog-id=194 op=LOAD May 15 01:15:56.261000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038e670 items=0 ppid=4872 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663038313733326366313162373365383538656532313435346663 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.263000 audit: BPF prog-id=195 op=LOAD May 15 01:15:56.263000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038e6b8 items=0 ppid=4872 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663038313733326366313162373365383538656532313435346663 May 15 01:15:56.268000 audit: BPF prog-id=195 op=UNLOAD May 15 01:15:56.268000 audit: BPF prog-id=194 op=UNLOAD May 15 01:15:56.268000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { perfmon } for pid=4882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit[4882]: AVC avc: denied { bpf } for pid=4882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.268000 audit: BPF prog-id=196 op=LOAD May 15 01:15:56.268000 audit[4882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038eac8 items=0 ppid=4872 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637663038313733326366313162373365383538656532313435346663 May 15 01:15:56.323000 audit[4907]: NETFILTER_CFG table=filter:113 family=2 entries=44 op=nft_register_chain pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:56.323000 audit[4907]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7fffc6e73330 a2=0 a3=7fffc6e7331c items=0 ppid=4427 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.323000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:56.366292 env[1250]: time="2025-05-15T01:15:56.291771788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b8cc979fc-pg889,Uid:8907c9d9-e315-4aa9-8a30-55983de20102,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452\"" May 15 01:15:56.272792 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 01:15:56.634509 systemd-networkd[1064]: calid9ac5c7eda2: Link UP May 15 01:15:56.634787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid9ac5c7eda2: link becomes ready May 15 01:15:56.634624 systemd-networkd[1064]: calid9ac5c7eda2: Gained carrier May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.192 [INFO][4833] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0 coredns-7db6d8ff4d- kube-system 8e0cc1c0-23db-422e-a082-8c150da20907 1016 0 2025-05-15 01:14:36 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-f8grq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid9ac5c7eda2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Namespace="kube-system" Pod="coredns-7db6d8ff4d-f8grq" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--f8grq-" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.192 [INFO][4833] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Namespace="kube-system" Pod="coredns-7db6d8ff4d-f8grq" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.225 [INFO][4854] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" HandleID="k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.267 [INFO][4854] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" HandleID="k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ba280), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-f8grq", "timestamp":"2025-05-15 01:15:56.225192241 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.267 [INFO][4854] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.267 [INFO][4854] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.267 [INFO][4854] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.335 [INFO][4854] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.449 [INFO][4854] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.512 [INFO][4854] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.527 [INFO][4854] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.563 [INFO][4854] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.563 [INFO][4854] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.564 [INFO][4854] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.572 [INFO][4854] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.625 [INFO][4854] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.625 [INFO][4854] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" host="localhost" May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.625 [INFO][4854] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:56.697259 env[1250]: 2025-05-15 01:15:56.625 [INFO][4854] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" HandleID="k8s-pod-network.14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:56.708000 audit[4920]: NETFILTER_CFG table=filter:114 family=2 entries=34 op=nft_register_chain pid=4920 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:56.708000 audit[4920]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7fff758a5bd0 a2=0 a3=7fff758a5bbc items=0 ppid=4427 pid=4920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.708000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:56.711034 env[1250]: 2025-05-15 01:15:56.626 [INFO][4833] cni-plugin/k8s.go 386: Populated endpoint ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Namespace="kube-system" Pod="coredns-7db6d8ff4d-f8grq" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8e0cc1c0-23db-422e-a082-8c150da20907", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-f8grq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid9ac5c7eda2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:56.711034 env[1250]: 2025-05-15 01:15:56.626 [INFO][4833] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Namespace="kube-system" Pod="coredns-7db6d8ff4d-f8grq" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:56.711034 env[1250]: 2025-05-15 01:15:56.626 [INFO][4833] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid9ac5c7eda2 ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Namespace="kube-system" Pod="coredns-7db6d8ff4d-f8grq" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:56.711034 env[1250]: 2025-05-15 01:15:56.633 [INFO][4833] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Namespace="kube-system" Pod="coredns-7db6d8ff4d-f8grq" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:56.711034 env[1250]: 2025-05-15 01:15:56.633 [INFO][4833] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Namespace="kube-system" Pod="coredns-7db6d8ff4d-f8grq" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8e0cc1c0-23db-422e-a082-8c150da20907", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb", Pod:"coredns-7db6d8ff4d-f8grq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid9ac5c7eda2", MAC:"5a:1b:08:b6:33:79", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:56.711034 env[1250]: 2025-05-15 01:15:56.694 [INFO][4833] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb" Namespace="kube-system" Pod="coredns-7db6d8ff4d-f8grq" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:15:56.726774 env[1250]: time="2025-05-15T01:15:56.723074065Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:15:56.726774 env[1250]: time="2025-05-15T01:15:56.723131323Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:15:56.726774 env[1250]: time="2025-05-15T01:15:56.723148790Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:15:56.726774 env[1250]: time="2025-05-15T01:15:56.723329298Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb pid=4928 runtime=io.containerd.runc.v2 May 15 01:15:56.732074 systemd[1]: Started cri-containerd-14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb.scope. May 15 01:15:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.743000 audit: BPF prog-id=197 op=LOAD May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4928 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633536633666323839383238346235386666353038356535653238 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4928 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633536633666323839383238346235386666353038356535653238 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit: BPF prog-id=198 op=LOAD May 15 01:15:56.744000 audit[4937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000408350 items=0 ppid=4928 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633536633666323839383238346235386666353038356535653238 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit: BPF prog-id=199 op=LOAD May 15 01:15:56.744000 audit[4937]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000408398 items=0 ppid=4928 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633536633666323839383238346235386666353038356535653238 May 15 01:15:56.744000 audit: BPF prog-id=199 op=UNLOAD May 15 01:15:56.744000 audit: BPF prog-id=198 op=UNLOAD May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { perfmon } for pid=4937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit[4937]: AVC avc: denied { bpf } for pid=4937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:56.744000 audit: BPF prog-id=200 op=LOAD May 15 01:15:56.744000 audit[4937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0004087a8 items=0 ppid=4928 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:56.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134633536633666323839383238346235386666353038356535653238 May 15 01:15:56.746539 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 01:15:56.775728 env[1250]: time="2025-05-15T01:15:56.775690979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-f8grq,Uid:8e0cc1c0-23db-422e-a082-8c150da20907,Namespace:kube-system,Attempt:1,} returns sandbox id \"14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb\"" May 15 01:15:56.797494 env[1250]: time="2025-05-15T01:15:56.797100710Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:15:56.805616 env[1250]: time="2025-05-15T01:15:56.805512353Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.853 [INFO][4975] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.853 [INFO][4975] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" iface="eth0" netns="/var/run/netns/cni-3d2c56ff-9a24-46d0-bf8b-25ca1741de58" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.853 [INFO][4975] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" iface="eth0" netns="/var/run/netns/cni-3d2c56ff-9a24-46d0-bf8b-25ca1741de58" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.853 [INFO][4975] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" iface="eth0" netns="/var/run/netns/cni-3d2c56ff-9a24-46d0-bf8b-25ca1741de58" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.853 [INFO][4975] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.853 [INFO][4975] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.875 [INFO][4982] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.875 [INFO][4982] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.875 [INFO][4982] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.879 [WARNING][4982] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.880 [INFO][4982] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.881 [INFO][4982] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:56.888336 env[1250]: 2025-05-15 01:15:56.882 [INFO][4975] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:15:56.890662 env[1250]: time="2025-05-15T01:15:56.890196556Z" level=info msg="TearDown network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" successfully" May 15 01:15:56.890662 env[1250]: time="2025-05-15T01:15:56.890233393Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" returns successfully" May 15 01:15:56.887527 systemd[1]: run-netns-cni\x2d3d2c56ff\x2d9a24\x2d46d0\x2dbf8b\x2d25ca1741de58.mount: Deactivated successfully. May 15 01:15:56.977385 env[1250]: time="2025-05-15T01:15:56.976825649Z" level=info msg="CreateContainer within sandbox \"14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 01:15:57.000308 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1838267795.mount: Deactivated successfully. May 15 01:15:57.016550 env[1250]: time="2025-05-15T01:15:57.016511351Z" level=info msg="CreateContainer within sandbox \"14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0a0966a73f2a3727f653ed7be554abb9c055f437c744758eb5c2298c6ff7180f\"" May 15 01:15:57.017686 env[1250]: time="2025-05-15T01:15:57.017118042Z" level=info msg="StartContainer for \"0a0966a73f2a3727f653ed7be554abb9c055f437c744758eb5c2298c6ff7180f\"" May 15 01:15:57.026795 systemd[1]: Started cri-containerd-0a0966a73f2a3727f653ed7be554abb9c055f437c744758eb5c2298c6ff7180f.scope. May 15 01:15:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit: BPF prog-id=201 op=LOAD May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4928 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303936366137336632613337323766363533656437626535353461 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4928 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303936366137336632613337323766363533656437626535353461 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit: BPF prog-id=202 op=LOAD May 15 01:15:57.036000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024690 items=0 ppid=4928 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303936366137336632613337323766363533656437626535353461 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit: BPF prog-id=203 op=LOAD May 15 01:15:57.036000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000246d8 items=0 ppid=4928 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303936366137336632613337323766363533656437626535353461 May 15 01:15:57.036000 audit: BPF prog-id=203 op=UNLOAD May 15 01:15:57.036000 audit: BPF prog-id=202 op=UNLOAD May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:57.036000 audit: BPF prog-id=204 op=LOAD May 15 01:15:57.036000 audit[4995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024ae8 items=0 ppid=4928 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:57.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303936366137336632613337323766363533656437626535353461 May 15 01:15:57.050629 env[1250]: time="2025-05-15T01:15:57.050594944Z" level=info msg="StartContainer for \"0a0966a73f2a3727f653ed7be554abb9c055f437c744758eb5c2298c6ff7180f\" returns successfully" May 15 01:15:57.118198 kubelet[2197]: I0515 01:15:57.118152 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-2qdfz\" (UniqueName: \"kubernetes.io/projected/ed686bf6-5f57-4483-afab-6f79b9da741f-kube-api-access-2qdfz\") pod \"ed686bf6-5f57-4483-afab-6f79b9da741f\" (UID: \"ed686bf6-5f57-4483-afab-6f79b9da741f\") " May 15 01:15:57.118508 kubelet[2197]: I0515 01:15:57.118495 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ed686bf6-5f57-4483-afab-6f79b9da741f-tigera-ca-bundle\") pod \"ed686bf6-5f57-4483-afab-6f79b9da741f\" (UID: \"ed686bf6-5f57-4483-afab-6f79b9da741f\") " May 15 01:15:57.156841 systemd-networkd[1064]: calia64dafd3141: Gained IPv6LL May 15 01:15:57.199953 kubelet[2197]: I0515 01:15:57.198828 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/ed686bf6-5f57-4483-afab-6f79b9da741f-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "ed686bf6-5f57-4483-afab-6f79b9da741f" (UID: "ed686bf6-5f57-4483-afab-6f79b9da741f"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 15 01:15:57.200045 kubelet[2197]: I0515 01:15:57.199978 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/ed686bf6-5f57-4483-afab-6f79b9da741f-kube-api-access-2qdfz" (OuterVolumeSpecName: "kube-api-access-2qdfz") pod "ed686bf6-5f57-4483-afab-6f79b9da741f" (UID: "ed686bf6-5f57-4483-afab-6f79b9da741f"). InnerVolumeSpecName "kube-api-access-2qdfz". PluginName "kubernetes.io/projected", VolumeGidValue "" May 15 01:15:57.224253 kubelet[2197]: I0515 01:15:57.224216 2197 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ed686bf6-5f57-4483-afab-6f79b9da741f-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 15 01:15:57.224253 kubelet[2197]: I0515 01:15:57.224248 2197 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-2qdfz\" (UniqueName: \"kubernetes.io/projected/ed686bf6-5f57-4483-afab-6f79b9da741f-kube-api-access-2qdfz\") on node \"localhost\" DevicePath \"\"" May 15 01:15:57.711386 systemd[1]: Removed slice kubepods-besteffort-poded686bf6_5f57_4483_afab_6f79b9da741f.slice. May 15 01:15:57.848327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2832042794.mount: Deactivated successfully. May 15 01:15:57.848404 systemd[1]: var-lib-kubelet-pods-ed686bf6\x2d5f57\x2d4483\x2dafab\x2d6f79b9da741f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d2qdfz.mount: Deactivated successfully. May 15 01:15:57.991157 kubelet[2197]: I0515 01:15:57.990810 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-f8grq" podStartSLOduration=81.990793779 podStartE2EDuration="1m21.990793779s" podCreationTimestamp="2025-05-15 01:14:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:15:57.989689809 +0000 UTC m=+94.418906880" watchObservedRunningTime="2025-05-15 01:15:57.990793779 +0000 UTC m=+94.420010849" May 15 01:15:58.043000 audit[5027]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:58.043000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffeff241840 a2=0 a3=7ffeff24182c items=0 ppid=2330 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:58.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:58.048000 audit[5027]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:58.048000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffeff241840 a2=0 a3=7ffeff24182c items=0 ppid=2330 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:58.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:58.112000 audit[5029]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:58.112000 audit[5029]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8b0cb6a0 a2=0 a3=7ffd8b0cb68c items=0 ppid=2330 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:58.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:58.190000 audit[5029]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=5029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:15:58.190000 audit[5029]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd8b0cb6a0 a2=0 a3=7ffd8b0cb68c items=0 ppid=2330 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:58.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:15:58.372870 systemd-networkd[1064]: calid9ac5c7eda2: Gained IPv6LL May 15 01:15:58.481333 kubelet[2197]: I0515 01:15:58.481297 2197 topology_manager.go:215] "Topology Admit Handler" podUID="c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca" podNamespace="calico-system" podName="calico-kube-controllers-7d4d46854f-rglwp" May 15 01:15:58.502497 systemd[1]: Created slice kubepods-besteffort-podc7ffda83_2bfb_4cbf_9659_a7fb2ce6e1ca.slice. May 15 01:15:58.683011 kubelet[2197]: I0515 01:15:58.682778 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qtdd9\" (UniqueName: \"kubernetes.io/projected/c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca-kube-api-access-qtdd9\") pod \"calico-kube-controllers-7d4d46854f-rglwp\" (UID: \"c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca\") " pod="calico-system/calico-kube-controllers-7d4d46854f-rglwp" May 15 01:15:58.683138 kubelet[2197]: I0515 01:15:58.683127 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca-tigera-ca-bundle\") pod \"calico-kube-controllers-7d4d46854f-rglwp\" (UID: \"c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca\") " pod="calico-system/calico-kube-controllers-7d4d46854f-rglwp" May 15 01:15:58.697596 env[1250]: time="2025-05-15T01:15:58.697131939Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.789 [INFO][5046] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.791 [INFO][5046] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" iface="eth0" netns="/var/run/netns/cni-f0ac4a09-f54a-aff1-f0e3-c2fef45b6407" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.791 [INFO][5046] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" iface="eth0" netns="/var/run/netns/cni-f0ac4a09-f54a-aff1-f0e3-c2fef45b6407" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.791 [INFO][5046] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" iface="eth0" netns="/var/run/netns/cni-f0ac4a09-f54a-aff1-f0e3-c2fef45b6407" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.792 [INFO][5046] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.792 [INFO][5046] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.829 [INFO][5057] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.829 [INFO][5057] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.829 [INFO][5057] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.834 [WARNING][5057] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.834 [INFO][5057] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.838 [INFO][5057] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:58.841632 env[1250]: 2025-05-15 01:15:58.839 [INFO][5046] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:15:58.857282 env[1250]: time="2025-05-15T01:15:58.843299615Z" level=info msg="TearDown network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" successfully" May 15 01:15:58.857282 env[1250]: time="2025-05-15T01:15:58.843324057Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" returns successfully" May 15 01:15:58.843201 systemd[1]: run-netns-cni\x2df0ac4a09\x2df54a\x2daff1\x2df0e3\x2dc2fef45b6407.mount: Deactivated successfully. May 15 01:15:58.865811 env[1250]: time="2025-05-15T01:15:58.865370389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9f4dbf687-7rvxc,Uid:6cf49426-ffa5-4b87-a387-036978b1ee62,Namespace:calico-apiserver,Attempt:1,}" May 15 01:15:59.038342 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 01:15:59.038442 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali914af6e4da3: link becomes ready May 15 01:15:59.038611 systemd-networkd[1064]: cali914af6e4da3: Link UP May 15 01:15:59.039405 systemd-networkd[1064]: cali914af6e4da3: Gained carrier May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.920 [INFO][5063] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0 calico-apiserver-9f4dbf687- calico-apiserver 6cf49426-ffa5-4b87-a387-036978b1ee62 1059 0 2025-05-15 01:14:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:9f4dbf687 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-9f4dbf687-7rvxc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali914af6e4da3 [] []}} ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-7rvxc" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.920 [INFO][5063] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-7rvxc" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.952 [INFO][5077] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.963 [INFO][5077] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033ec50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-9f4dbf687-7rvxc", "timestamp":"2025-05-15 01:15:58.952308927 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.963 [INFO][5077] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.963 [INFO][5077] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.963 [INFO][5077] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.964 [INFO][5077] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.989 [INFO][5077] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.998 [INFO][5077] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:58.999 [INFO][5077] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:59.000 [INFO][5077] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:59.000 [INFO][5077] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:59.001 [INFO][5077] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4 May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:59.009 [INFO][5077] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:59.013 [INFO][5077] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:59.013 [INFO][5077] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" host="localhost" May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:59.013 [INFO][5077] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:59.051295 env[1250]: 2025-05-15 01:15:59.013 [INFO][5077] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:59.066447 env[1250]: 2025-05-15 01:15:59.015 [INFO][5063] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-7rvxc" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0", GenerateName:"calico-apiserver-9f4dbf687-", Namespace:"calico-apiserver", SelfLink:"", UID:"6cf49426-ffa5-4b87-a387-036978b1ee62", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9f4dbf687", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-9f4dbf687-7rvxc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali914af6e4da3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:59.066447 env[1250]: 2025-05-15 01:15:59.015 [INFO][5063] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-7rvxc" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:59.066447 env[1250]: 2025-05-15 01:15:59.015 [INFO][5063] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali914af6e4da3 ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-7rvxc" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:59.066447 env[1250]: 2025-05-15 01:15:59.039 [INFO][5063] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-7rvxc" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:59.066447 env[1250]: 2025-05-15 01:15:59.040 [INFO][5063] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-7rvxc" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0", GenerateName:"calico-apiserver-9f4dbf687-", Namespace:"calico-apiserver", SelfLink:"", UID:"6cf49426-ffa5-4b87-a387-036978b1ee62", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9f4dbf687", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4", Pod:"calico-apiserver-9f4dbf687-7rvxc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali914af6e4da3", MAC:"26:4f:9e:f0:46:43", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:59.066447 env[1250]: 2025-05-15 01:15:59.047 [INFO][5063] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-7rvxc" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:15:59.081000 audit[5094]: NETFILTER_CFG table=filter:119 family=2 entries=42 op=nft_register_chain pid=5094 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:59.081000 audit[5094]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffe1914eeb0 a2=0 a3=7ffe1914ee9c items=0 ppid=4427 pid=5094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.081000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:59.110460 env[1250]: time="2025-05-15T01:15:59.110405506Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:15:59.110570 env[1250]: time="2025-05-15T01:15:59.110465342Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:15:59.110570 env[1250]: time="2025-05-15T01:15:59.110481218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:15:59.110679 env[1250]: time="2025-05-15T01:15:59.110650769Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4 pid=5107 runtime=io.containerd.runc.v2 May 15 01:15:59.142164 systemd[1]: Started cri-containerd-0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4.scope. May 15 01:15:59.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit: BPF prog-id=205 op=LOAD May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001adc48 a2=10 a3=1c items=0 ppid=5107 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386430633661326233363065383033626562353161616231386637 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001ad6b0 a2=3c a3=c items=0 ppid=5107 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386430633661326233363065383033626562353161616231386637 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit: BPF prog-id=206 op=LOAD May 15 01:15:59.155000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001ad9d8 a2=78 a3=c000299800 items=0 ppid=5107 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386430633661326233363065383033626562353161616231386637 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.155000 audit: BPF prog-id=207 op=LOAD May 15 01:15:59.155000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001ad770 a2=78 a3=c000299848 items=0 ppid=5107 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386430633661326233363065383033626562353161616231386637 May 15 01:15:59.156000 audit: BPF prog-id=207 op=UNLOAD May 15 01:15:59.156000 audit: BPF prog-id=206 op=UNLOAD May 15 01:15:59.156000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { perfmon } for pid=5116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit[5116]: AVC avc: denied { bpf } for pid=5116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.156000 audit: BPF prog-id=208 op=LOAD May 15 01:15:59.156000 audit[5116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001adc30 a2=78 a3=c000299c58 items=0 ppid=5107 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064386430633661326233363065383033626562353161616231386637 May 15 01:15:59.158202 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 01:15:59.187405 env[1250]: time="2025-05-15T01:15:59.187376639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9f4dbf687-7rvxc,Uid:6cf49426-ffa5-4b87-a387-036978b1ee62,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\"" May 15 01:15:59.206274 env[1250]: time="2025-05-15T01:15:59.206206433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:15:59.209552 env[1250]: time="2025-05-15T01:15:59.209524962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:15:59.210629 env[1250]: time="2025-05-15T01:15:59.210598549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4d46854f-rglwp,Uid:c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca,Namespace:calico-system,Attempt:0,}" May 15 01:15:59.212113 env[1250]: time="2025-05-15T01:15:59.212089590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:15:59.212590 env[1250]: time="2025-05-15T01:15:59.212567656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 01:15:59.213525 env[1250]: time="2025-05-15T01:15:59.213084622Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:15:59.234903 env[1250]: time="2025-05-15T01:15:59.234872232Z" level=info msg="CreateContainer within sandbox \"f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 01:15:59.239844 env[1250]: time="2025-05-15T01:15:59.239819789Z" level=info msg="CreateContainer within sandbox \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 01:15:59.246261 env[1250]: time="2025-05-15T01:15:59.246235772Z" level=info msg="CreateContainer within sandbox \"f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2a03e0296b1572aabf9cc555f0c2fa08e3c9af3df2f1b9168b621d0457de80c1\"" May 15 01:15:59.249840 env[1250]: time="2025-05-15T01:15:59.249816413Z" level=info msg="StartContainer for \"2a03e0296b1572aabf9cc555f0c2fa08e3c9af3df2f1b9168b621d0457de80c1\"" May 15 01:15:59.255386 env[1250]: time="2025-05-15T01:15:59.255356803Z" level=info msg="CreateContainer within sandbox \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\"" May 15 01:15:59.256088 env[1250]: time="2025-05-15T01:15:59.256074335Z" level=info msg="StartContainer for \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\"" May 15 01:15:59.272238 systemd[1]: Started cri-containerd-2a03e0296b1572aabf9cc555f0c2fa08e3c9af3df2f1b9168b621d0457de80c1.scope. May 15 01:15:59.282726 systemd[1]: Started cri-containerd-fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56.scope. May 15 01:15:59.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.308000 audit: BPF prog-id=209 op=LOAD May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00013dc48 a2=10 a3=1c items=0 ppid=5107 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396339343033306434313938393165393961613533363263313566 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00013d6b0 a2=3c a3=8 items=0 ppid=5107 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396339343033306434313938393165393961613533363263313566 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit: BPF prog-id=210 op=LOAD May 15 01:15:59.309000 audit[5177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013d9d8 a2=78 a3=c0003ad400 items=0 ppid=5107 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396339343033306434313938393165393961613533363263313566 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.309000 audit: BPF prog-id=211 op=LOAD May 15 01:15:59.309000 audit[5177]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00013d770 a2=78 a3=c0003ad448 items=0 ppid=5107 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396339343033306434313938393165393961613533363263313566 May 15 01:15:59.309000 audit: BPF prog-id=211 op=UNLOAD May 15 01:15:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit: BPF prog-id=212 op=LOAD May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4872 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303365303239366231353732616162663963633535356630633266 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4872 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303365303239366231353732616162663963633535356630633266 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit: BPF prog-id=213 op=LOAD May 15 01:15:59.312000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003850e0 items=0 ppid=4872 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303365303239366231353732616162663963633535356630633266 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit: BPF prog-id=214 op=LOAD May 15 01:15:59.312000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000385128 items=0 ppid=4872 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303365303239366231353732616162663963633535356630633266 May 15 01:15:59.312000 audit: BPF prog-id=214 op=UNLOAD May 15 01:15:59.312000 audit: BPF prog-id=213 op=UNLOAD May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.312000 audit: BPF prog-id=215 op=LOAD May 15 01:15:59.312000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000385538 items=0 ppid=4872 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261303365303239366231353732616162663963633535356630633266 May 15 01:15:59.313000 audit: BPF prog-id=210 op=UNLOAD May 15 01:15:59.313000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { perfmon } for pid=5177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit[5177]: AVC avc: denied { bpf } for pid=5177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.313000 audit: BPF prog-id=216 op=LOAD May 15 01:15:59.313000 audit[5177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013dc30 a2=78 a3=c0003ad858 items=0 ppid=5107 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662396339343033306434313938393165393961613533363263313566 May 15 01:15:59.355403 env[1250]: time="2025-05-15T01:15:59.350584489Z" level=info msg="StartContainer for \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\" returns successfully" May 15 01:15:59.355403 env[1250]: time="2025-05-15T01:15:59.352416547Z" level=info msg="StartContainer for \"2a03e0296b1572aabf9cc555f0c2fa08e3c9af3df2f1b9168b621d0457de80c1\" returns successfully" May 15 01:15:59.394753 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7b1316cc968: link becomes ready May 15 01:15:59.388629 systemd-networkd[1064]: cali7b1316cc968: Link UP May 15 01:15:59.394832 systemd-networkd[1064]: cali7b1316cc968: Gained carrier May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.259 [INFO][5142] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0 calico-kube-controllers-7d4d46854f- calico-system c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca 1057 0 2025-05-15 01:15:58 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7d4d46854f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7d4d46854f-rglwp eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali7b1316cc968 [] []}} ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Namespace="calico-system" Pod="calico-kube-controllers-7d4d46854f-rglwp" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.259 [INFO][5142] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Namespace="calico-system" Pod="calico-kube-controllers-7d4d46854f-rglwp" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.351 [INFO][5185] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" HandleID="k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Workload="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.362 [INFO][5185] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" HandleID="k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Workload="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011a420), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7d4d46854f-rglwp", "timestamp":"2025-05-15 01:15:59.351913861 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.362 [INFO][5185] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.362 [INFO][5185] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.362 [INFO][5185] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.364 [INFO][5185] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.368 [INFO][5185] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.374 [INFO][5185] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.375 [INFO][5185] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.377 [INFO][5185] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.377 [INFO][5185] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.378 [INFO][5185] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735 May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.381 [INFO][5185] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.384 [INFO][5185] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.384 [INFO][5185] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" host="localhost" May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.384 [INFO][5185] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:59.406972 env[1250]: 2025-05-15 01:15:59.384 [INFO][5185] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" HandleID="k8s-pod-network.f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Workload="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" May 15 01:15:59.407670 env[1250]: 2025-05-15 01:15:59.386 [INFO][5142] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Namespace="calico-system" Pod="calico-kube-controllers-7d4d46854f-rglwp" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0", GenerateName:"calico-kube-controllers-7d4d46854f-", Namespace:"calico-system", SelfLink:"", UID:"c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca", ResourceVersion:"1057", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 15, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4d46854f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7d4d46854f-rglwp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7b1316cc968", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:59.407670 env[1250]: 2025-05-15 01:15:59.386 [INFO][5142] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Namespace="calico-system" Pod="calico-kube-controllers-7d4d46854f-rglwp" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" May 15 01:15:59.407670 env[1250]: 2025-05-15 01:15:59.386 [INFO][5142] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7b1316cc968 ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Namespace="calico-system" Pod="calico-kube-controllers-7d4d46854f-rglwp" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" May 15 01:15:59.407670 env[1250]: 2025-05-15 01:15:59.389 [INFO][5142] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Namespace="calico-system" Pod="calico-kube-controllers-7d4d46854f-rglwp" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" May 15 01:15:59.407670 env[1250]: 2025-05-15 01:15:59.397 [INFO][5142] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Namespace="calico-system" Pod="calico-kube-controllers-7d4d46854f-rglwp" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0", GenerateName:"calico-kube-controllers-7d4d46854f-", Namespace:"calico-system", SelfLink:"", UID:"c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca", ResourceVersion:"1057", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 15, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4d46854f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735", Pod:"calico-kube-controllers-7d4d46854f-rglwp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7b1316cc968", MAC:"66:76:c6:eb:94:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:59.407670 env[1250]: 2025-05-15 01:15:59.404 [INFO][5142] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735" Namespace="calico-system" Pod="calico-kube-controllers-7d4d46854f-rglwp" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d46854f--rglwp-eth0" May 15 01:15:59.418350 env[1250]: time="2025-05-15T01:15:59.418303037Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:15:59.418350 env[1250]: time="2025-05-15T01:15:59.418330303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:15:59.418532 env[1250]: time="2025-05-15T01:15:59.418503963Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:15:59.418732 env[1250]: time="2025-05-15T01:15:59.418692520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735 pid=5250 runtime=io.containerd.runc.v2 May 15 01:15:59.428643 systemd[1]: Started cri-containerd-f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735.scope. May 15 01:15:59.445000 audit[5276]: NETFILTER_CFG table=filter:120 family=2 entries=50 op=nft_register_chain pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:59.445000 audit[5276]: SYSCALL arch=c000003e syscall=46 success=yes exit=23900 a0=3 a1=7fffd21f0c30 a2=0 a3=7fffd21f0c1c items=0 ppid=4427 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.445000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit: BPF prog-id=217 op=LOAD May 15 01:15:59.446000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5250 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396633653863646138303831383635636334666138353233316132 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5250 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396633653863646138303831383635636334666138353233316132 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.446000 audit: BPF prog-id=218 op=LOAD May 15 01:15:59.446000 audit[5258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002219f0 items=0 ppid=5250 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396633653863646138303831383635636334666138353233316132 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit: BPF prog-id=219 op=LOAD May 15 01:15:59.447000 audit[5258]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221a38 items=0 ppid=5250 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396633653863646138303831383635636334666138353233316132 May 15 01:15:59.447000 audit: BPF prog-id=219 op=UNLOAD May 15 01:15:59.447000 audit: BPF prog-id=218 op=UNLOAD May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { perfmon } for pid=5258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit[5258]: AVC avc: denied { bpf } for pid=5258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:15:59.447000 audit: BPF prog-id=220 op=LOAD May 15 01:15:59.447000 audit[5258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221e48 items=0 ppid=5250 pid=5258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636396633653863646138303831383635636334666138353233316132 May 15 01:15:59.448399 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 01:15:59.484702 env[1250]: time="2025-05-15T01:15:59.484664749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4d46854f-rglwp,Uid:c7ffda83-2bfb-4cbf-9659-a7fb2ce6e1ca,Namespace:calico-system,Attempt:0,} returns sandbox id \"f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735\"" May 15 01:15:59.494665 env[1250]: time="2025-05-15T01:15:59.494637362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 01:15:59.691441 env[1250]: time="2025-05-15T01:15:59.691417741Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:15:59.709228 kubelet[2197]: I0515 01:15:59.709149 2197 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="ed686bf6-5f57-4483-afab-6f79b9da741f" path="/var/lib/kubelet/pods/ed686bf6-5f57-4483-afab-6f79b9da741f/volumes" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.738 [INFO][5307] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.738 [INFO][5307] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" iface="eth0" netns="/var/run/netns/cni-1c232b96-c359-93e1-3e38-3cb6998a689b" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.738 [INFO][5307] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" iface="eth0" netns="/var/run/netns/cni-1c232b96-c359-93e1-3e38-3cb6998a689b" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.739 [INFO][5307] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" iface="eth0" netns="/var/run/netns/cni-1c232b96-c359-93e1-3e38-3cb6998a689b" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.739 [INFO][5307] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.739 [INFO][5307] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.792 [INFO][5315] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.792 [INFO][5315] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.792 [INFO][5315] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.796 [WARNING][5315] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.796 [INFO][5315] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.797 [INFO][5315] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:59.800297 env[1250]: 2025-05-15 01:15:59.798 [INFO][5307] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:15:59.801316 env[1250]: time="2025-05-15T01:15:59.800423357Z" level=info msg="TearDown network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" successfully" May 15 01:15:59.801316 env[1250]: time="2025-05-15T01:15:59.800449944Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" returns successfully" May 15 01:15:59.801316 env[1250]: time="2025-05-15T01:15:59.801067786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9f4dbf687-f8xs5,Uid:d8a122ac-2bdd-49bc-8377-b156b680505d,Namespace:calico-apiserver,Attempt:1,}" May 15 01:15:59.872791 systemd[1]: run-containerd-runc-k8s.io-0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4-runc.af0xRo.mount: Deactivated successfully. May 15 01:15:59.872886 systemd[1]: run-netns-cni\x2d1c232b96\x2dc359\x2d93e1\x2d3e38\x2d3cb6998a689b.mount: Deactivated successfully. May 15 01:15:59.918452 systemd-networkd[1064]: calid830be3bf47: Link UP May 15 01:15:59.918604 systemd-networkd[1064]: calid830be3bf47: Gained carrier May 15 01:15:59.919010 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid830be3bf47: link becomes ready May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.839 [INFO][5321] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0 calico-apiserver-9f4dbf687- calico-apiserver d8a122ac-2bdd-49bc-8377-b156b680505d 1077 0 2025-05-15 01:14:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:9f4dbf687 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-9f4dbf687-f8xs5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid830be3bf47 [] []}} ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-f8xs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.839 [INFO][5321] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-f8xs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.865 [INFO][5334] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.879 [INFO][5334] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004e2610), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-9f4dbf687-f8xs5", "timestamp":"2025-05-15 01:15:59.865609621 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.880 [INFO][5334] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.880 [INFO][5334] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.880 [INFO][5334] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.882 [INFO][5334] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.887 [INFO][5334] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.890 [INFO][5334] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.893 [INFO][5334] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.895 [INFO][5334] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.895 [INFO][5334] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.896 [INFO][5334] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52 May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.899 [INFO][5334] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.904 [INFO][5334] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.904 [INFO][5334] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" host="localhost" May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.904 [INFO][5334] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:15:59.930897 env[1250]: 2025-05-15 01:15:59.904 [INFO][5334] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.932230 env[1250]: 2025-05-15 01:15:59.906 [INFO][5321] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-f8xs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0", GenerateName:"calico-apiserver-9f4dbf687-", Namespace:"calico-apiserver", SelfLink:"", UID:"d8a122ac-2bdd-49bc-8377-b156b680505d", ResourceVersion:"1077", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9f4dbf687", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-9f4dbf687-f8xs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid830be3bf47", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:59.932230 env[1250]: 2025-05-15 01:15:59.906 [INFO][5321] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-f8xs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.932230 env[1250]: 2025-05-15 01:15:59.906 [INFO][5321] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid830be3bf47 ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-f8xs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.932230 env[1250]: 2025-05-15 01:15:59.918 [INFO][5321] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-f8xs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.932230 env[1250]: 2025-05-15 01:15:59.918 [INFO][5321] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-f8xs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0", GenerateName:"calico-apiserver-9f4dbf687-", Namespace:"calico-apiserver", SelfLink:"", UID:"d8a122ac-2bdd-49bc-8377-b156b680505d", ResourceVersion:"1077", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9f4dbf687", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52", Pod:"calico-apiserver-9f4dbf687-f8xs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid830be3bf47", MAC:"16:3d:db:83:7c:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:15:59.932230 env[1250]: 2025-05-15 01:15:59.926 [INFO][5321] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Namespace="calico-apiserver" Pod="calico-apiserver-9f4dbf687-f8xs5" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:15:59.946261 env[1250]: time="2025-05-15T01:15:59.944562266Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:15:59.946261 env[1250]: time="2025-05-15T01:15:59.944595019Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:15:59.946261 env[1250]: time="2025-05-15T01:15:59.944605366Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:15:59.946749 env[1250]: time="2025-05-15T01:15:59.946531752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52 pid=5359 runtime=io.containerd.runc.v2 May 15 01:15:59.963620 systemd[1]: run-containerd-runc-k8s.io-dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52-runc.1c7Kdu.mount: Deactivated successfully. May 15 01:15:59.970163 systemd[1]: Started cri-containerd-dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52.scope. May 15 01:15:59.996000 kernel: kauditd_printk_skb: 419 callbacks suppressed May 15 01:15:59.996087 kernel: audit: type=1325 audit(1747271759.990:1406): table=filter:121 family=2 entries=56 op=nft_register_chain pid=5380 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:16:00.002959 kernel: audit: type=1300 audit(1747271759.990:1406): arch=c000003e syscall=46 success=yes exit=27932 a0=3 a1=7ffd40dcbf40 a2=0 a3=7ffd40dcbf2c items=0 ppid=4427 pid=5380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.003010 kernel: audit: type=1327 audit(1747271759.990:1406): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:15:59.990000 audit[5380]: NETFILTER_CFG table=filter:121 family=2 entries=56 op=nft_register_chain pid=5380 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:15:59.990000 audit[5380]: SYSCALL arch=c000003e syscall=46 success=yes exit=27932 a0=3 a1=7ffd40dcbf40 a2=0 a3=7ffd40dcbf2c items=0 ppid=4427 pid=5380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:15:59.990000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:16:00.013094 kernel: audit: type=1400 audit(1747271760.007:1407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.013167 kernel: audit: type=1400 audit(1747271760.007:1408): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.016722 kernel: audit: type=1400 audit(1747271760.007:1409): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.017202 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 01:16:00.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.020736 kernel: audit: type=1400 audit(1747271760.007:1410): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.023730 kernel: audit: type=1400 audit(1747271760.007:1411): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.027788 kernel: audit: type=1400 audit(1747271760.007:1412): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.031184 kernel: audit: type=1400 audit(1747271760.007:1413): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.007000 audit: BPF prog-id=221 op=LOAD May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5359 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463316162633730323635303137663564323436373061323136386666 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5359 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463316162633730323635303137663564323436373061323136386666 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit: BPF prog-id=222 op=LOAD May 15 01:16:00.012000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024710 items=0 ppid=5359 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463316162633730323635303137663564323436373061323136386666 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit: BPF prog-id=223 op=LOAD May 15 01:16:00.012000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024758 items=0 ppid=5359 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463316162633730323635303137663564323436373061323136386666 May 15 01:16:00.012000 audit: BPF prog-id=223 op=UNLOAD May 15 01:16:00.012000 audit: BPF prog-id=222 op=UNLOAD May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { perfmon } for pid=5371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit[5371]: AVC avc: denied { bpf } for pid=5371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.012000 audit: BPF prog-id=224 op=LOAD May 15 01:16:00.012000 audit[5371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024b68 items=0 ppid=5359 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463316162633730323635303137663564323436373061323136386666 May 15 01:16:00.056345 kubelet[2197]: I0515 01:16:00.053221 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-9f4dbf687-7rvxc" podStartSLOduration=78.047476861 podStartE2EDuration="1m18.047476861s" podCreationTimestamp="2025-05-15 01:14:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:16:00.046225031 +0000 UTC m=+96.475442103" watchObservedRunningTime="2025-05-15 01:16:00.047476861 +0000 UTC m=+96.476693920" May 15 01:16:00.056897 kubelet[2197]: I0515 01:16:00.056873 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b8cc979fc-pg889" podStartSLOduration=74.374092439 podStartE2EDuration="1m17.056862136s" podCreationTimestamp="2025-05-15 01:14:43 +0000 UTC" firstStartedPulling="2025-05-15 01:15:56.546558002 +0000 UTC m=+92.975775064" lastFinishedPulling="2025-05-15 01:15:59.229327699 +0000 UTC m=+95.658544761" observedRunningTime="2025-05-15 01:16:00.056539967 +0000 UTC m=+96.485757029" watchObservedRunningTime="2025-05-15 01:16:00.056862136 +0000 UTC m=+96.486079203" May 15 01:16:00.091830 env[1250]: time="2025-05-15T01:16:00.091801573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9f4dbf687-f8xs5,Uid:d8a122ac-2bdd-49bc-8377-b156b680505d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\"" May 15 01:16:00.115000 audit[5396]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=5396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:00.115000 audit[5396]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffbf79c8c0 a2=0 a3=7fffbf79c8ac items=0 ppid=2330 pid=5396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:00.119000 audit[5396]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=5396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:00.119000 audit[5396]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffbf79c8c0 a2=0 a3=7fffbf79c8ac items=0 ppid=2330 pid=5396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:00.131446 env[1250]: time="2025-05-15T01:16:00.121685119Z" level=info msg="CreateContainer within sandbox \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 01:16:00.131000 audit[5398]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:00.131000 audit[5398]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe26f3fc50 a2=0 a3=7ffe26f3fc3c items=0 ppid=2330 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:00.133000 audit[5398]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:00.133000 audit[5398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe26f3fc50 a2=0 a3=7ffe26f3fc3c items=0 ppid=2330 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:00.183529 env[1250]: time="2025-05-15T01:16:00.183498849Z" level=info msg="CreateContainer within sandbox \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\"" May 15 01:16:00.184032 env[1250]: time="2025-05-15T01:16:00.184016659Z" level=info msg="StartContainer for \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\"" May 15 01:16:00.214202 systemd[1]: Started cri-containerd-1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424.scope. May 15 01:16:00.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit: BPF prog-id=225 op=LOAD May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5359 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363161326537323436383339633831666635633465646632633733 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5359 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363161326537323436383339633831666635633465646632633733 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit: BPF prog-id=226 op=LOAD May 15 01:16:00.240000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3cf0 items=0 ppid=5359 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363161326537323436383339633831666635633465646632633733 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit: BPF prog-id=227 op=LOAD May 15 01:16:00.240000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3d38 items=0 ppid=5359 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363161326537323436383339633831666635633465646632633733 May 15 01:16:00.240000 audit: BPF prog-id=227 op=UNLOAD May 15 01:16:00.240000 audit: BPF prog-id=226 op=UNLOAD May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:00.240000 audit: BPF prog-id=228 op=LOAD May 15 01:16:00.240000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0148 items=0 ppid=5359 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:00.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135363161326537323436383339633831666635633465646632633733 May 15 01:16:00.253000 audit[5193]: AVC avc: denied { watch } for pid=5193 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_01_15_00.349578836/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c678 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c34,c678 tclass=file permissive=0 May 15 01:16:00.253000 audit[5193]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0012ebc40 a2=fc6 a3=0 items=0 ppid=4872 pid=5193 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c678 key=(null) May 15 01:16:00.253000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 01:16:00.371000 audit[5200]: AVC avc: denied { watch } for pid=5200 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_01_15_00.438834391/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c278,c373 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c278,c373 tclass=file permissive=0 May 15 01:16:00.371000 audit[5200]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ac8580 a2=fc6 a3=0 items=0 ppid=5107 pid=5200 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c278,c373 key=(null) May 15 01:16:00.371000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 01:16:00.528356 env[1250]: time="2025-05-15T01:16:00.528326966Z" level=info msg="StartContainer for \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\" returns successfully" May 15 01:16:00.548851 systemd-networkd[1064]: cali7b1316cc968: Gained IPv6LL May 15 01:16:00.996816 systemd-networkd[1064]: cali914af6e4da3: Gained IPv6LL May 15 01:16:01.073345 kubelet[2197]: I0515 01:16:01.073304 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-9f4dbf687-f8xs5" podStartSLOduration=78.070429183 podStartE2EDuration="1m18.070429183s" podCreationTimestamp="2025-05-15 01:14:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:16:01.062442061 +0000 UTC m=+97.491659133" watchObservedRunningTime="2025-05-15 01:16:01.070429183 +0000 UTC m=+97.499646249" May 15 01:16:01.073975 kubelet[2197]: I0515 01:16:01.073960 2197 topology_manager.go:215] "Topology Admit Handler" podUID="95d1cb69-3f73-42f8-b639-548e383f43f8" podNamespace="calico-apiserver" podName="calico-apiserver-6b8cc979fc-zn2c5" May 15 01:16:01.096620 systemd[1]: Created slice kubepods-besteffort-pod95d1cb69_3f73_42f8_b639_548e383f43f8.slice. May 15 01:16:01.144000 audit[5438]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=5438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:01.144000 audit[5438]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffddf5b6fa0 a2=0 a3=7ffddf5b6f8c items=0 ppid=2330 pid=5438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:01.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:01.147000 audit[5438]: NETFILTER_CFG table=nat:127 family=2 entries=31 op=nft_register_chain pid=5438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:01.147000 audit[5438]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffddf5b6fa0 a2=0 a3=7ffddf5b6f8c items=0 ppid=2330 pid=5438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:01.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:01.217697 kubelet[2197]: I0515 01:16:01.217661 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/95d1cb69-3f73-42f8-b639-548e383f43f8-calico-apiserver-certs\") pod \"calico-apiserver-6b8cc979fc-zn2c5\" (UID: \"95d1cb69-3f73-42f8-b639-548e383f43f8\") " pod="calico-apiserver/calico-apiserver-6b8cc979fc-zn2c5" May 15 01:16:01.217832 kubelet[2197]: I0515 01:16:01.217773 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5jd74\" (UniqueName: \"kubernetes.io/projected/95d1cb69-3f73-42f8-b639-548e383f43f8-kube-api-access-5jd74\") pod \"calico-apiserver-6b8cc979fc-zn2c5\" (UID: \"95d1cb69-3f73-42f8-b639-548e383f43f8\") " pod="calico-apiserver/calico-apiserver-6b8cc979fc-zn2c5" May 15 01:16:01.284000 audit[5418]: AVC avc: denied { watch } for pid=5418 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_01_15_00.1749256088/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c911 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c48,c911 tclass=file permissive=0 May 15 01:16:01.284000 audit[5418]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00061ff00 a2=fc6 a3=0 items=0 ppid=5359 pid=5418 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c911 key=(null) May 15 01:16:01.284000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 01:16:01.402113 env[1250]: time="2025-05-15T01:16:01.402090188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b8cc979fc-zn2c5,Uid:95d1cb69-3f73-42f8-b639-548e383f43f8,Namespace:calico-apiserver,Attempt:0,}" May 15 01:16:01.617821 systemd-networkd[1064]: calif7e0e44fe21: Link UP May 15 01:16:01.625790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 01:16:01.648344 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif7e0e44fe21: link becomes ready May 15 01:16:01.620715 systemd-networkd[1064]: calif7e0e44fe21: Gained carrier May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.443 [INFO][5442] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0 calico-apiserver-6b8cc979fc- calico-apiserver 95d1cb69-3f73-42f8-b639-548e383f43f8 1125 0 2025-05-15 01:16:01 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b8cc979fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6b8cc979fc-zn2c5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif7e0e44fe21 [] []}} ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-zn2c5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.443 [INFO][5442] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-zn2c5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.522 [INFO][5454] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" HandleID="k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.543 [INFO][5454] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" HandleID="k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031d840), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6b8cc979fc-zn2c5", "timestamp":"2025-05-15 01:16:01.522648621 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.543 [INFO][5454] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.543 [INFO][5454] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.545 [INFO][5454] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.546 [INFO][5454] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.551 [INFO][5454] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.562 [INFO][5454] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.566 [INFO][5454] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.568 [INFO][5454] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.568 [INFO][5454] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.575 [INFO][5454] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446 May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.595 [INFO][5454] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.608 [INFO][5454] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.608 [INFO][5454] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" host="localhost" May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.608 [INFO][5454] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:01.651156 env[1250]: 2025-05-15 01:16:01.608 [INFO][5454] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" HandleID="k8s-pod-network.8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" May 15 01:16:01.636834 systemd-networkd[1064]: calid830be3bf47: Gained IPv6LL May 15 01:16:01.660074 env[1250]: 2025-05-15 01:16:01.611 [INFO][5442] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-zn2c5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0", GenerateName:"calico-apiserver-6b8cc979fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"95d1cb69-3f73-42f8-b639-548e383f43f8", ResourceVersion:"1125", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 16, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b8cc979fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6b8cc979fc-zn2c5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif7e0e44fe21", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:01.660074 env[1250]: 2025-05-15 01:16:01.611 [INFO][5442] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.135/32] ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-zn2c5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" May 15 01:16:01.660074 env[1250]: 2025-05-15 01:16:01.611 [INFO][5442] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif7e0e44fe21 ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-zn2c5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" May 15 01:16:01.660074 env[1250]: 2025-05-15 01:16:01.621 [INFO][5442] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-zn2c5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" May 15 01:16:01.660074 env[1250]: 2025-05-15 01:16:01.621 [INFO][5442] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-zn2c5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0", GenerateName:"calico-apiserver-6b8cc979fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"95d1cb69-3f73-42f8-b639-548e383f43f8", ResourceVersion:"1125", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 16, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b8cc979fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446", Pod:"calico-apiserver-6b8cc979fc-zn2c5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif7e0e44fe21", MAC:"7e:12:99:2c:f1:8f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:01.660074 env[1250]: 2025-05-15 01:16:01.637 [INFO][5442] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446" Namespace="calico-apiserver" Pod="calico-apiserver-6b8cc979fc-zn2c5" WorkloadEndpoint="localhost-k8s-calico--apiserver--6b8cc979fc--zn2c5-eth0" May 15 01:16:01.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-147.75.109.163:60764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:01.723366 systemd[1]: Started sshd@8-139.178.70.100:22-147.75.109.163:60764.service. May 15 01:16:01.762336 env[1250]: time="2025-05-15T01:16:01.762066986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:16:01.762459 env[1250]: time="2025-05-15T01:16:01.762330199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:16:01.762459 env[1250]: time="2025-05-15T01:16:01.762341921Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:16:01.764873 env[1250]: time="2025-05-15T01:16:01.764062800Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446 pid=5477 runtime=io.containerd.runc.v2 May 15 01:16:01.824301 systemd[1]: Started cri-containerd-8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446.scope. May 15 01:16:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.900000 audit: BPF prog-id=229 op=LOAD May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5477 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:01.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343061626164326139646539666130663234363166323636376636 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5477 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:01.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343061626164326139646539666130663234363166323636376636 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit: BPF prog-id=230 op=LOAD May 15 01:16:01.901000 audit[5486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00036a190 items=0 ppid=5477 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:01.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343061626164326139646539666130663234363166323636376636 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit: BPF prog-id=231 op=LOAD May 15 01:16:01.901000 audit[5486]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00036a1d8 items=0 ppid=5477 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:01.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343061626164326139646539666130663234363166323636376636 May 15 01:16:01.901000 audit: BPF prog-id=231 op=UNLOAD May 15 01:16:01.901000 audit: BPF prog-id=230 op=UNLOAD May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { perfmon } for pid=5486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit[5486]: AVC avc: denied { bpf } for pid=5486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:01.901000 audit: BPF prog-id=232 op=LOAD May 15 01:16:01.901000 audit[5486]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00036a5e8 items=0 ppid=5477 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:01.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834343061626164326139646539666130663234363166323636376636 May 15 01:16:01.910102 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 01:16:01.980413 env[1250]: time="2025-05-15T01:16:01.964618781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b8cc979fc-zn2c5,Uid:95d1cb69-3f73-42f8-b639-548e383f43f8,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446\"" May 15 01:16:02.081041 sshd[5470]: Accepted publickey for core from 147.75.109.163 port 60764 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:02.079000 audit[5470]: USER_ACCT pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:02.094000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:02.094000 audit[5470]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd16e696a0 a2=3 a3=0 items=0 ppid=1 pid=5470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:02.094000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:02.098000 audit[5518]: NETFILTER_CFG table=filter:128 family=2 entries=50 op=nft_register_chain pid=5518 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:16:02.098000 audit[5518]: SYSCALL arch=c000003e syscall=46 success=yes exit=25064 a0=3 a1=7ffd944e67f0 a2=0 a3=7ffd944e67dc items=0 ppid=4427 pid=5518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:02.098000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:16:02.107613 sshd[5470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:02.130152 systemd[1]: Started session-10.scope. May 15 01:16:02.131139 systemd-logind[1239]: New session 10 of user core. May 15 01:16:02.138000 audit[5470]: USER_START pid=5470 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:02.140000 audit[5521]: CRED_ACQ pid=5521 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:02.724968 systemd-networkd[1064]: calif7e0e44fe21: Gained IPv6LL May 15 01:16:02.906189 env[1250]: time="2025-05-15T01:16:02.906154754Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:02.911431 env[1250]: time="2025-05-15T01:16:02.911411205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:02.912639 env[1250]: time="2025-05-15T01:16:02.912625455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:02.914633 env[1250]: time="2025-05-15T01:16:02.914618813Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:02.915009 env[1250]: time="2025-05-15T01:16:02.914994240Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 01:16:05.841376 kubelet[2197]: E0515 01:16:05.839042 2197 kubelet.go:2511] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="2.683s" May 15 01:16:05.912221 env[1250]: time="2025-05-15T01:16:05.911973907Z" level=info msg="CreateContainer within sandbox \"f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 01:16:05.928069 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3945563420.mount: Deactivated successfully. May 15 01:16:05.940049 env[1250]: time="2025-05-15T01:16:05.940017207Z" level=info msg="CreateContainer within sandbox \"f69f3e8cda8081865cc4fa85231a28fb092672151bedfe4b5d24b1ecb80dc735\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b811de180b8d105809225c68f557752cea401b4f67e0c1c31dc124a4d2aa0399\"" May 15 01:16:05.966324 env[1250]: time="2025-05-15T01:16:05.966129661Z" level=info msg="CreateContainer within sandbox \"8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 01:16:05.980085 env[1250]: time="2025-05-15T01:16:05.980056048Z" level=info msg="CreateContainer within sandbox \"8440abad2a9de9fa0f2461f2667f6dca40c2d38f009d11f03bd109108ba44446\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3458b89332445390f053d6377e8370cbf0120a45abce586b911084545aaadd7c\"" May 15 01:16:05.991292 env[1250]: time="2025-05-15T01:16:05.991267040Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:16:05.992555 env[1250]: time="2025-05-15T01:16:05.991568169Z" level=info msg="StopContainer for \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\" with timeout 30 (s)" May 15 01:16:05.992744 env[1250]: time="2025-05-15T01:16:05.991674799Z" level=info msg="StartContainer for \"b811de180b8d105809225c68f557752cea401b4f67e0c1c31dc124a4d2aa0399\"" May 15 01:16:05.995096 env[1250]: time="2025-05-15T01:16:05.995072453Z" level=info msg="Stop container \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\" with signal terminated" May 15 01:16:06.017157 env[1250]: time="2025-05-15T01:16:06.017133052Z" level=info msg="StartContainer for \"3458b89332445390f053d6377e8370cbf0120a45abce586b911084545aaadd7c\"" May 15 01:16:06.029480 kernel: kauditd_printk_skb: 202 callbacks suppressed May 15 01:16:06.036871 kernel: audit: type=1334 audit(1747271766.025:1477): prog-id=225 op=UNLOAD May 15 01:16:06.036972 kernel: audit: type=1334 audit(1747271766.030:1478): prog-id=228 op=UNLOAD May 15 01:16:06.025000 audit: BPF prog-id=225 op=UNLOAD May 15 01:16:06.030000 audit: BPF prog-id=228 op=UNLOAD May 15 01:16:06.025916 systemd[1]: cri-containerd-1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424.scope: Deactivated successfully. May 15 01:16:06.053758 systemd[1]: Started cri-containerd-b811de180b8d105809225c68f557752cea401b4f67e0c1c31dc124a4d2aa0399.scope. May 15 01:16:06.075677 systemd[1]: Started cri-containerd-3458b89332445390f053d6377e8370cbf0120a45abce586b911084545aaadd7c.scope. May 15 01:16:06.110423 env[1250]: time="2025-05-15T01:16:06.110359706Z" level=info msg="shim disconnected" id=1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424 May 15 01:16:06.110601 env[1250]: time="2025-05-15T01:16:06.110588776Z" level=warning msg="cleaning up after shim disconnected" id=1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424 namespace=k8s.io May 15 01:16:06.110663 env[1250]: time="2025-05-15T01:16:06.110650479Z" level=info msg="cleaning up dead shim" May 15 01:16:06.124446 kernel: audit: type=1400 audit(1747271766.115:1479): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.125287 kernel: audit: type=1400 audit(1747271766.115:1480): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.125361 kernel: audit: type=1400 audit(1747271766.115:1481): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.130394 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 01:16:06.131325 kernel: audit: audit_lost=8 audit_rate_limit=0 audit_backlog_limit=64 May 15 01:16:06.131361 kernel: audit: backlog limit exceeded May 15 01:16:06.131458 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 01:16:06.131482 kernel: audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 May 15 01:16:06.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.115000 audit: BPF prog-id=233 op=LOAD May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00013dc48 a2=10 a3=1c items=0 ppid=5477 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862383933333234343533393066303533643633373765383337 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00013d6b0 a2=3c a3=8 items=0 ppid=5477 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862383933333234343533393066303533643633373765383337 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit: BPF prog-id=234 op=LOAD May 15 01:16:06.124000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013d9d8 a2=78 a3=c000217970 items=0 ppid=5477 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862383933333234343533393066303533643633373765383337 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit: BPF prog-id=235 op=LOAD May 15 01:16:06.124000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00013d770 a2=78 a3=c0002179b8 items=0 ppid=5477 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862383933333234343533393066303533643633373765383337 May 15 01:16:06.124000 audit: BPF prog-id=235 op=UNLOAD May 15 01:16:06.124000 audit: BPF prog-id=234 op=UNLOAD May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.124000 audit: BPF prog-id=236 op=LOAD May 15 01:16:06.124000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013dc30 a2=78 a3=c000217dc8 items=0 ppid=5477 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862383933333234343533393066303533643633373765383337 May 15 01:16:06.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5250 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313164653138306238643130353830393232356336386635353737 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=5250 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313164653138306238643130353830393232356336386635353737 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit: BPF prog-id=238 op=LOAD May 15 01:16:06.135000 audit[5546]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00030b3a0 items=0 ppid=5250 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313164653138306238643130353830393232356336386635353737 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit: BPF prog-id=239 op=LOAD May 15 01:16:06.135000 audit[5546]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00030b3e8 items=0 ppid=5250 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313164653138306238643130353830393232356336386635353737 May 15 01:16:06.135000 audit: BPF prog-id=239 op=UNLOAD May 15 01:16:06.135000 audit: BPF prog-id=238 op=UNLOAD May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { perfmon } for pid=5546 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit[5546]: AVC avc: denied { bpf } for pid=5546 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:06.135000 audit: BPF prog-id=240 op=LOAD May 15 01:16:06.135000 audit[5546]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00030b7f8 items=0 ppid=5250 pid=5546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313164653138306238643130353830393232356336386635353737 May 15 01:16:06.153360 env[1250]: time="2025-05-15T01:16:06.153322728Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:16:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5612 runtime=io.containerd.runc.v2\n" May 15 01:16:06.156703 env[1250]: time="2025-05-15T01:16:06.156661346Z" level=info msg="StopContainer for \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\" returns successfully" May 15 01:16:06.162105 env[1250]: time="2025-05-15T01:16:06.162083071Z" level=info msg="StopPodSandbox for \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\"" May 15 01:16:06.162351 env[1250]: time="2025-05-15T01:16:06.162333227Z" level=info msg="Container to stop \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 01:16:06.186000 audit: BPF prog-id=221 op=UNLOAD May 15 01:16:06.187078 systemd[1]: cri-containerd-dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52.scope: Deactivated successfully. May 15 01:16:06.190000 audit: BPF prog-id=224 op=UNLOAD May 15 01:16:06.241314 env[1250]: time="2025-05-15T01:16:06.241286661Z" level=info msg="StartContainer for \"3458b89332445390f053d6377e8370cbf0120a45abce586b911084545aaadd7c\" returns successfully" May 15 01:16:06.252092 env[1250]: time="2025-05-15T01:16:06.252057716Z" level=info msg="shim disconnected" id=dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52 May 15 01:16:06.252593 env[1250]: time="2025-05-15T01:16:06.252186753Z" level=warning msg="cleaning up after shim disconnected" id=dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52 namespace=k8s.io May 15 01:16:06.252593 env[1250]: time="2025-05-15T01:16:06.252197309Z" level=info msg="cleaning up dead shim" May 15 01:16:06.253959 env[1250]: time="2025-05-15T01:16:06.253924072Z" level=info msg="StartContainer for \"b811de180b8d105809225c68f557752cea401b4f67e0c1c31dc124a4d2aa0399\" returns successfully" May 15 01:16:06.257817 kubelet[2197]: E0515 01:16:06.257571 2197 cadvisor_stats_provider.go:500] "Partial failure issuing cadvisor.ContainerInfoV2" err="partial failures: [\"/kubepods.slice/kubepods-besteffort.slice/kubepods-besteffort-podd8a122ac_2bdd_49bc_8377_b156b680505d.slice/cri-containerd-dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52.scope\": RecentStats: unable to find data in memory cache]" May 15 01:16:06.260590 env[1250]: time="2025-05-15T01:16:06.260556896Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:16:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5663 runtime=io.containerd.runc.v2\n" May 15 01:16:06.341692 sshd[5470]: pam_unix(sshd:session): session closed for user core May 15 01:16:06.351000 audit[5470]: USER_END pid=5470 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:06.356000 audit[5470]: CRED_DISP pid=5470 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:06.460168 systemd[1]: sshd@8-139.178.70.100:22-147.75.109.163:60764.service: Deactivated successfully. May 15 01:16:06.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.100:22-147.75.109.163:60764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:06.464591 systemd[1]: session-10.scope: Deactivated successfully. May 15 01:16:06.465762 systemd-logind[1239]: Session 10 logged out. Waiting for processes to exit. May 15 01:16:06.466319 systemd-logind[1239]: Removed session 10. May 15 01:16:06.779498 systemd-networkd[1064]: calid830be3bf47: Link DOWN May 15 01:16:06.779506 systemd-networkd[1064]: calid830be3bf47: Lost carrier May 15 01:16:06.832848 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3227175070.mount: Deactivated successfully. May 15 01:16:06.832937 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424-rootfs.mount: Deactivated successfully. May 15 01:16:06.832990 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52-rootfs.mount: Deactivated successfully. May 15 01:16:06.833046 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52-shm.mount: Deactivated successfully. May 15 01:16:06.917000 audit[5724]: NETFILTER_CFG table=filter:129 family=2 entries=56 op=nft_register_rule pid=5724 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:16:06.917000 audit[5724]: SYSCALL arch=c000003e syscall=46 success=yes exit=9080 a0=3 a1=7ffd745c3b60 a2=0 a3=7ffd745c3b4c items=0 ppid=4427 pid=5724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.917000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:16:06.918000 audit[5724]: NETFILTER_CFG table=filter:130 family=2 entries=4 op=nft_unregister_chain pid=5724 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:16:06.918000 audit[5724]: SYSCALL arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7ffd745c3b60 a2=0 a3=56129db15000 items=0 ppid=4427 pid=5724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:06.918000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:16:06.992809 kubelet[2197]: I0515 01:16:06.992780 2197 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:07.041411 systemd[1]: run-containerd-runc-k8s.io-b811de180b8d105809225c68f557752cea401b4f67e0c1c31dc124a4d2aa0399-runc.HyFylv.mount: Deactivated successfully. May 15 01:16:07.051797 kubelet[2197]: I0515 01:16:07.015513 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7d4d46854f-rglwp" podStartSLOduration=3.120662439 podStartE2EDuration="9.000921028s" podCreationTimestamp="2025-05-15 01:15:58 +0000 UTC" firstStartedPulling="2025-05-15 01:15:59.493509884 +0000 UTC m=+95.922726955" lastFinishedPulling="2025-05-15 01:16:05.373768481 +0000 UTC m=+101.802985544" observedRunningTime="2025-05-15 01:16:07.000663674 +0000 UTC m=+103.429880757" watchObservedRunningTime="2025-05-15 01:16:07.000921028 +0000 UTC m=+103.430138092" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:06.770 [INFO][5624] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:06.774 [INFO][5624] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" iface="eth0" netns="/var/run/netns/cni-e5b4c5f4-efd4-8f0b-bbd0-f3c63add1829" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:06.775 [INFO][5624] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" iface="eth0" netns="/var/run/netns/cni-e5b4c5f4-efd4-8f0b-bbd0-f3c63add1829" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:06.777 [INFO][5624] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" iface="eth0" netns="/var/run/netns/cni-e5b4c5f4-efd4-8f0b-bbd0-f3c63add1829" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:06.777 [INFO][5624] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:06.777 [INFO][5624] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:07.247 [INFO][5706] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:07.251 [INFO][5706] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:07.252 [INFO][5706] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:07.269 [WARNING][5706] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:07.269 [INFO][5706] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:07.272 [INFO][5706] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:07.276676 env[1250]: 2025-05-15 01:16:07.275 [INFO][5624] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:07.286953 env[1250]: time="2025-05-15T01:16:07.277174696Z" level=info msg="TearDown network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" successfully" May 15 01:16:07.286953 env[1250]: time="2025-05-15T01:16:07.277206445Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" returns successfully" May 15 01:16:07.286953 env[1250]: time="2025-05-15T01:16:07.281732261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wtmff,Uid:cb8fa4fa-c090-4fc9-9efe-29e402cdd32f,Namespace:calico-system,Attempt:1,}" May 15 01:16:07.280166 systemd[1]: run-netns-cni\x2de5b4c5f4\x2defd4\x2d8f0b\x2dbbd0\x2df3c63add1829.mount: Deactivated successfully. May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:06.770 [INFO][5690] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:06.774 [INFO][5690] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" iface="eth0" netns="/var/run/netns/cni-d5934b50-3812-94bb-0c29-145e2abb983c" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:06.774 [INFO][5690] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" iface="eth0" netns="/var/run/netns/cni-d5934b50-3812-94bb-0c29-145e2abb983c" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:06.787 [INFO][5690] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" after=12.922427ms iface="eth0" netns="/var/run/netns/cni-d5934b50-3812-94bb-0c29-145e2abb983c" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:06.787 [INFO][5690] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:06.787 [INFO][5690] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:07.247 [INFO][5708] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:07.251 [INFO][5708] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:07.274 [INFO][5708] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:07.397 [INFO][5708] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:07.397 [INFO][5708] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:07.400 [INFO][5708] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:07.404062 env[1250]: 2025-05-15 01:16:07.401 [INFO][5690] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:07.413439 env[1250]: time="2025-05-15T01:16:07.404254021Z" level=info msg="TearDown network for sandbox \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\" successfully" May 15 01:16:07.413439 env[1250]: time="2025-05-15T01:16:07.404275793Z" level=info msg="StopPodSandbox for \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\" returns successfully" May 15 01:16:07.413550 env[1250]: time="2025-05-15T01:16:07.413531951Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:16:07.464000 audit[5779]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=5779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:07.464000 audit[5779]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffccc6fae60 a2=0 a3=7ffccc6fae4c items=0 ppid=2330 pid=5779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:07.468000 audit[5779]: NETFILTER_CFG table=nat:132 family=2 entries=36 op=nft_register_rule pid=5779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:07.468000 audit[5779]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffccc6fae60 a2=0 a3=7ffccc6fae4c items=0 ppid=2330 pid=5779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:07.501796 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali254f34687a9: link becomes ready May 15 01:16:07.505873 systemd-networkd[1064]: cali254f34687a9: Link UP May 15 01:16:07.505996 systemd-networkd[1064]: cali254f34687a9: Gained carrier May 15 01:16:07.515686 kubelet[2197]: I0515 01:16:07.515244 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b8cc979fc-zn2c5" podStartSLOduration=6.515222886 podStartE2EDuration="6.515222886s" podCreationTimestamp="2025-05-15 01:16:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 01:16:07.052522846 +0000 UTC m=+103.481739908" watchObservedRunningTime="2025-05-15 01:16:07.515222886 +0000 UTC m=+103.944439960" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.362 [INFO][5754] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--wtmff-eth0 csi-node-driver- calico-system cb8fa4fa-c090-4fc9-9efe-29e402cdd32f 1189 0 2025-05-15 01:14:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-wtmff eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali254f34687a9 [] []}} ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Namespace="calico-system" Pod="csi-node-driver-wtmff" WorkloadEndpoint="localhost-k8s-csi--node--driver--wtmff-" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.364 [INFO][5754] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Namespace="calico-system" Pod="csi-node-driver-wtmff" WorkloadEndpoint="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.447 [INFO][5767] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" HandleID="k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.464 [INFO][5767] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" HandleID="k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050a80), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-wtmff", "timestamp":"2025-05-15 01:16:07.443643695 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.464 [INFO][5767] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.464 [INFO][5767] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.464 [INFO][5767] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.476 [INFO][5767] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.480 [INFO][5767] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.484 [INFO][5767] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.486 [INFO][5767] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.488 [INFO][5767] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.488 [INFO][5767] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.489 [INFO][5767] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.492 [INFO][5767] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.496 [INFO][5767] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.496 [INFO][5767] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" host="localhost" May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.496 [INFO][5767] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:07.519776 env[1250]: 2025-05-15 01:16:07.496 [INFO][5767] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" HandleID="k8s-pod-network.3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.524853 env[1250]: 2025-05-15 01:16:07.498 [INFO][5754] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Namespace="calico-system" Pod="csi-node-driver-wtmff" WorkloadEndpoint="localhost-k8s-csi--node--driver--wtmff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wtmff-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f", ResourceVersion:"1189", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-wtmff", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali254f34687a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:07.524853 env[1250]: 2025-05-15 01:16:07.498 [INFO][5754] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.136/32] ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Namespace="calico-system" Pod="csi-node-driver-wtmff" WorkloadEndpoint="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.524853 env[1250]: 2025-05-15 01:16:07.498 [INFO][5754] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali254f34687a9 ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Namespace="calico-system" Pod="csi-node-driver-wtmff" WorkloadEndpoint="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.524853 env[1250]: 2025-05-15 01:16:07.502 [INFO][5754] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Namespace="calico-system" Pod="csi-node-driver-wtmff" WorkloadEndpoint="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.524853 env[1250]: 2025-05-15 01:16:07.502 [INFO][5754] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Namespace="calico-system" Pod="csi-node-driver-wtmff" WorkloadEndpoint="localhost-k8s-csi--node--driver--wtmff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wtmff-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f", ResourceVersion:"1189", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b", Pod:"csi-node-driver-wtmff", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali254f34687a9", MAC:"0e:23:32:fd:a1:2a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:07.524853 env[1250]: 2025-05-15 01:16:07.517 [INFO][5754] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b" Namespace="calico-system" Pod="csi-node-driver-wtmff" WorkloadEndpoint="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:07.553629 env[1250]: time="2025-05-15T01:16:07.551873328Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 01:16:07.553629 env[1250]: time="2025-05-15T01:16:07.551910723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 01:16:07.553629 env[1250]: time="2025-05-15T01:16:07.551923345Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 01:16:07.554776 env[1250]: time="2025-05-15T01:16:07.553971482Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b pid=5807 runtime=io.containerd.runc.v2 May 15 01:16:07.614622 systemd[1]: Started cri-containerd-3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b.scope. May 15 01:16:07.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit: BPF prog-id=241 op=LOAD May 15 01:16:07.629000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5807 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663737333334613731346238623332313933316333316464393538 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5807 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663737333334613731346238623332313933316333316464393538 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.629000 audit: BPF prog-id=242 op=LOAD May 15 01:16:07.629000 audit[5820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003087a0 items=0 ppid=5807 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663737333334613731346238623332313933316333316464393538 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit: BPF prog-id=243 op=LOAD May 15 01:16:07.630000 audit[5820]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003087e8 items=0 ppid=5807 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663737333334613731346238623332313933316333316464393538 May 15 01:16:07.630000 audit: BPF prog-id=243 op=UNLOAD May 15 01:16:07.630000 audit: BPF prog-id=242 op=UNLOAD May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { perfmon } for pid=5820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit[5820]: AVC avc: denied { bpf } for pid=5820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:07.630000 audit: BPF prog-id=244 op=LOAD May 15 01:16:07.630000 audit[5820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000308bf8 items=0 ppid=5807 pid=5820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361663737333334613731346238623332313933316333316464393538 May 15 01:16:07.636060 systemd-resolved[1196]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.567 [WARNING][5793] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0", GenerateName:"calico-apiserver-9f4dbf687-", Namespace:"calico-apiserver", SelfLink:"", UID:"d8a122ac-2bdd-49bc-8377-b156b680505d", ResourceVersion:"1188", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9f4dbf687", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52", Pod:"calico-apiserver-9f4dbf687-f8xs5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid830be3bf47", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.568 [INFO][5793] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.568 [INFO][5793] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" iface="eth0" netns="" May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.568 [INFO][5793] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.568 [INFO][5793] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.619 [INFO][5825] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.619 [INFO][5825] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.619 [INFO][5825] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.633 [WARNING][5825] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.633 [INFO][5825] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.635 [INFO][5825] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:07.675939 env[1250]: 2025-05-15 01:16:07.639 [INFO][5793] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:07.675939 env[1250]: time="2025-05-15T01:16:07.641880112Z" level=info msg="TearDown network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" successfully" May 15 01:16:07.675939 env[1250]: time="2025-05-15T01:16:07.641913220Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" returns successfully" May 15 01:16:07.675939 env[1250]: time="2025-05-15T01:16:07.644237026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wtmff,Uid:cb8fa4fa-c090-4fc9-9efe-29e402cdd32f,Namespace:calico-system,Attempt:1,} returns sandbox id \"3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b\"" May 15 01:16:07.682000 audit[5854]: NETFILTER_CFG table=filter:133 family=2 entries=54 op=nft_register_chain pid=5854 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:16:07.682000 audit[5854]: SYSCALL arch=c000003e syscall=46 success=yes exit=24580 a0=3 a1=7ffcbd1bf860 a2=0 a3=7ffcbd1bf84c items=0 ppid=4427 pid=5854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.682000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:16:07.827296 systemd[1]: run-netns-cni\x2dd5934b50\x2d3812\x2d94bb\x2d0c29\x2d145e2abb983c.mount: Deactivated successfully. May 15 01:16:07.853549 env[1250]: time="2025-05-15T01:16:07.853329679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 01:16:07.906000 audit[5858]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5858 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:07.906000 audit[5858]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdfbaab320 a2=0 a3=7ffdfbaab30c items=0 ppid=2330 pid=5858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:07.911000 audit[5858]: NETFILTER_CFG table=nat:135 family=2 entries=36 op=nft_register_rule pid=5858 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:07.911000 audit[5858]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdfbaab320 a2=0 a3=7ffdfbaab30c items=0 ppid=2330 pid=5858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:07.911000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:07.933050 kubelet[2197]: I0515 01:16:07.933022 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d8a122ac-2bdd-49bc-8377-b156b680505d-calico-apiserver-certs\") pod \"d8a122ac-2bdd-49bc-8377-b156b680505d\" (UID: \"d8a122ac-2bdd-49bc-8377-b156b680505d\") " May 15 01:16:07.933174 kubelet[2197]: I0515 01:16:07.933070 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-4nl8z\" (UniqueName: \"kubernetes.io/projected/d8a122ac-2bdd-49bc-8377-b156b680505d-kube-api-access-4nl8z\") pod \"d8a122ac-2bdd-49bc-8377-b156b680505d\" (UID: \"d8a122ac-2bdd-49bc-8377-b156b680505d\") " May 15 01:16:07.968651 systemd[1]: var-lib-kubelet-pods-d8a122ac\x2d2bdd\x2d49bc\x2d8377\x2db156b680505d-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d4nl8z.mount: Deactivated successfully. May 15 01:16:07.970642 systemd[1]: var-lib-kubelet-pods-d8a122ac\x2d2bdd\x2d49bc\x2d8377\x2db156b680505d-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 15 01:16:07.996833 kubelet[2197]: I0515 01:16:07.989633 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d8a122ac-2bdd-49bc-8377-b156b680505d-kube-api-access-4nl8z" (OuterVolumeSpecName: "kube-api-access-4nl8z") pod "d8a122ac-2bdd-49bc-8377-b156b680505d" (UID: "d8a122ac-2bdd-49bc-8377-b156b680505d"). InnerVolumeSpecName "kube-api-access-4nl8z". PluginName "kubernetes.io/projected", VolumeGidValue "" May 15 01:16:07.996833 kubelet[2197]: I0515 01:16:07.988870 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d8a122ac-2bdd-49bc-8377-b156b680505d-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "d8a122ac-2bdd-49bc-8377-b156b680505d" (UID: "d8a122ac-2bdd-49bc-8377-b156b680505d"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 15 01:16:08.036287 kubelet[2197]: I0515 01:16:08.036245 2197 reconciler_common.go:289] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d8a122ac-2bdd-49bc-8377-b156b680505d-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 15 01:16:08.036287 kubelet[2197]: I0515 01:16:08.036268 2197 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-4nl8z\" (UniqueName: \"kubernetes.io/projected/d8a122ac-2bdd-49bc-8377-b156b680505d-kube-api-access-4nl8z\") on node \"localhost\" DevicePath \"\"" May 15 01:16:08.100000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_01_16_01.3692519613/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c171,c372 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c171,c372 tclass=file permissive=0 May 15 01:16:08.100000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004636e0 a2=fc6 a3=0 items=0 ppid=5477 pid=5602 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c171,c372 key=(null) May 15 01:16:08.100000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 01:16:08.285655 env[1250]: time="2025-05-15T01:16:08.285546703Z" level=info msg="StopContainer for \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\" with timeout 30 (s)" May 15 01:16:08.288924 env[1250]: time="2025-05-15T01:16:08.288899292Z" level=info msg="Stop container \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\" with signal terminated" May 15 01:16:08.300000 audit: BPF prog-id=209 op=UNLOAD May 15 01:16:08.301151 systemd[1]: cri-containerd-fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56.scope: Deactivated successfully. May 15 01:16:08.305000 audit: BPF prog-id=216 op=UNLOAD May 15 01:16:08.335319 env[1250]: time="2025-05-15T01:16:08.335291572Z" level=info msg="shim disconnected" id=fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56 May 15 01:16:08.335526 env[1250]: time="2025-05-15T01:16:08.335513762Z" level=warning msg="cleaning up after shim disconnected" id=fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56 namespace=k8s.io May 15 01:16:08.335588 env[1250]: time="2025-05-15T01:16:08.335577686Z" level=info msg="cleaning up dead shim" May 15 01:16:08.341179 env[1250]: time="2025-05-15T01:16:08.341131120Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:16:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5898 runtime=io.containerd.runc.v2\n" May 15 01:16:08.345907 env[1250]: time="2025-05-15T01:16:08.345850702Z" level=info msg="StopContainer for \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\" returns successfully" May 15 01:16:08.386554 systemd[1]: Removed slice kubepods-besteffort-podd8a122ac_2bdd_49bc_8377_b156b680505d.slice. May 15 01:16:08.387621 env[1250]: time="2025-05-15T01:16:08.387602249Z" level=info msg="StopPodSandbox for \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\"" May 15 01:16:08.388273 env[1250]: time="2025-05-15T01:16:08.387698357Z" level=info msg="Container to stop \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 01:16:08.395142 systemd[1]: cri-containerd-0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4.scope: Deactivated successfully. May 15 01:16:08.394000 audit: BPF prog-id=205 op=UNLOAD May 15 01:16:08.399000 audit: BPF prog-id=208 op=UNLOAD May 15 01:16:08.425807 env[1250]: time="2025-05-15T01:16:08.425772628Z" level=info msg="shim disconnected" id=0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4 May 15 01:16:08.425807 env[1250]: time="2025-05-15T01:16:08.425805898Z" level=warning msg="cleaning up after shim disconnected" id=0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4 namespace=k8s.io May 15 01:16:08.426004 env[1250]: time="2025-05-15T01:16:08.425812729Z" level=info msg="cleaning up dead shim" May 15 01:16:08.433838 env[1250]: time="2025-05-15T01:16:08.433791892Z" level=warning msg="cleanup warnings time=\"2025-05-15T01:16:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5932 runtime=io.containerd.runc.v2\n" May 15 01:16:08.503620 systemd-networkd[1064]: cali914af6e4da3: Link DOWN May 15 01:16:08.503625 systemd-networkd[1064]: cali914af6e4da3: Lost carrier May 15 01:16:08.519000 audit[5974]: NETFILTER_CFG table=filter:136 family=2 entries=52 op=nft_register_rule pid=5974 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:16:08.519000 audit[5974]: SYSCALL arch=c000003e syscall=46 success=yes exit=8960 a0=3 a1=7ffef9c0de70 a2=0 a3=7ffef9c0de5c items=0 ppid=4427 pid=5974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:08.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:16:08.519000 audit[5974]: NETFILTER_CFG table=filter:137 family=2 entries=2 op=nft_unregister_chain pid=5974 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 01:16:08.519000 audit[5974]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffef9c0de70 a2=0 a3=561391ba5000 items=0 ppid=4427 pid=5974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:08.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.499 [INFO][5959] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.499 [INFO][5959] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" iface="eth0" netns="/var/run/netns/cni-047ec4cd-4340-8aec-d243-0e87b23fd5c4" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.500 [INFO][5959] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" iface="eth0" netns="/var/run/netns/cni-047ec4cd-4340-8aec-d243-0e87b23fd5c4" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.508 [INFO][5959] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" after=9.315636ms iface="eth0" netns="/var/run/netns/cni-047ec4cd-4340-8aec-d243-0e87b23fd5c4" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.508 [INFO][5959] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.508 [INFO][5959] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.617 [INFO][5968] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.617 [INFO][5968] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.617 [INFO][5968] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.647 [INFO][5968] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.647 [INFO][5968] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.647 [INFO][5968] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:08.651228 env[1250]: 2025-05-15 01:16:08.649 [INFO][5959] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:08.651841 env[1250]: time="2025-05-15T01:16:08.651808199Z" level=info msg="TearDown network for sandbox \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\" successfully" May 15 01:16:08.651906 env[1250]: time="2025-05-15T01:16:08.651893204Z" level=info msg="StopPodSandbox for \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\" returns successfully" May 15 01:16:08.652327 env[1250]: time="2025-05-15T01:16:08.652313760Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.687 [WARNING][5990] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0", GenerateName:"calico-apiserver-9f4dbf687-", Namespace:"calico-apiserver", SelfLink:"", UID:"6cf49426-ffa5-4b87-a387-036978b1ee62", ResourceVersion:"1239", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9f4dbf687", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4", Pod:"calico-apiserver-9f4dbf687-7rvxc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali914af6e4da3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.688 [INFO][5990] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.688 [INFO][5990] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" iface="eth0" netns="" May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.688 [INFO][5990] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.688 [INFO][5990] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.702 [INFO][5998] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.702 [INFO][5998] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.702 [INFO][5998] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.714 [WARNING][5998] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.714 [INFO][5998] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.715 [INFO][5998] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:08.718039 env[1250]: 2025-05-15 01:16:08.716 [INFO][5990] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:08.718967 env[1250]: time="2025-05-15T01:16:08.718445399Z" level=info msg="TearDown network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" successfully" May 15 01:16:08.718967 env[1250]: time="2025-05-15T01:16:08.718467248Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" returns successfully" May 15 01:16:08.744000 audit[6006]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=6006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:08.744000 audit[6006]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe92813690 a2=0 a3=7ffe9281367c items=0 ppid=2330 pid=6006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:08.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:08.749000 audit[6006]: NETFILTER_CFG table=nat:139 family=2 entries=38 op=nft_register_chain pid=6006 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:08.749000 audit[6006]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffe92813690 a2=0 a3=7ffe9281367c items=0 ppid=2330 pid=6006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:08.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:08.792205 kubelet[2197]: I0515 01:16:08.792079 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6cf49426-ffa5-4b87-a387-036978b1ee62-calico-apiserver-certs\") pod \"6cf49426-ffa5-4b87-a387-036978b1ee62\" (UID: \"6cf49426-ffa5-4b87-a387-036978b1ee62\") " May 15 01:16:08.792205 kubelet[2197]: I0515 01:16:08.792121 2197 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-5clbw\" (UniqueName: \"kubernetes.io/projected/6cf49426-ffa5-4b87-a387-036978b1ee62-kube-api-access-5clbw\") pod \"6cf49426-ffa5-4b87-a387-036978b1ee62\" (UID: \"6cf49426-ffa5-4b87-a387-036978b1ee62\") " May 15 01:16:08.805980 systemd-networkd[1064]: cali254f34687a9: Gained IPv6LL May 15 01:16:08.810199 kubelet[2197]: I0515 01:16:08.810171 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/6cf49426-ffa5-4b87-a387-036978b1ee62-kube-api-access-5clbw" (OuterVolumeSpecName: "kube-api-access-5clbw") pod "6cf49426-ffa5-4b87-a387-036978b1ee62" (UID: "6cf49426-ffa5-4b87-a387-036978b1ee62"). InnerVolumeSpecName "kube-api-access-5clbw". PluginName "kubernetes.io/projected", VolumeGidValue "" May 15 01:16:08.810199 kubelet[2197]: I0515 01:16:08.810167 2197 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/6cf49426-ffa5-4b87-a387-036978b1ee62-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "6cf49426-ffa5-4b87-a387-036978b1ee62" (UID: "6cf49426-ffa5-4b87-a387-036978b1ee62"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 15 01:16:08.824126 systemd[1]: run-containerd-runc-k8s.io-b811de180b8d105809225c68f557752cea401b4f67e0c1c31dc124a4d2aa0399-runc.sPkl38.mount: Deactivated successfully. May 15 01:16:08.824231 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56-rootfs.mount: Deactivated successfully. May 15 01:16:08.824287 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4-rootfs.mount: Deactivated successfully. May 15 01:16:08.824333 systemd[1]: run-netns-cni\x2d047ec4cd\x2d4340\x2d8aec\x2dd243\x2d0e87b23fd5c4.mount: Deactivated successfully. May 15 01:16:08.824375 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4-shm.mount: Deactivated successfully. May 15 01:16:08.824427 systemd[1]: var-lib-kubelet-pods-6cf49426\x2dffa5\x2d4b87\x2da387\x2d036978b1ee62-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 15 01:16:08.824471 systemd[1]: var-lib-kubelet-pods-6cf49426\x2dffa5\x2d4b87\x2da387\x2d036978b1ee62-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d5clbw.mount: Deactivated successfully. May 15 01:16:08.893161 kubelet[2197]: I0515 01:16:08.893136 2197 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-5clbw\" (UniqueName: \"kubernetes.io/projected/6cf49426-ffa5-4b87-a387-036978b1ee62-kube-api-access-5clbw\") on node \"localhost\" DevicePath \"\"" May 15 01:16:08.893340 kubelet[2197]: I0515 01:16:08.893330 2197 reconciler_common.go:289] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6cf49426-ffa5-4b87-a387-036978b1ee62-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 15 01:16:09.101689 systemd[1]: Removed slice kubepods-besteffort-pod6cf49426_ffa5_4b87_a387_036978b1ee62.slice. May 15 01:16:09.179253 kubelet[2197]: I0515 01:16:09.179228 2197 scope.go:117] "RemoveContainer" containerID="fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56" May 15 01:16:09.203199 env[1250]: time="2025-05-15T01:16:09.203177187Z" level=info msg="RemoveContainer for \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\"" May 15 01:16:09.221719 env[1250]: time="2025-05-15T01:16:09.221668475Z" level=info msg="RemoveContainer for \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\" returns successfully" May 15 01:16:09.222098 kubelet[2197]: I0515 01:16:09.222064 2197 scope.go:117] "RemoveContainer" containerID="fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56" May 15 01:16:09.222445 env[1250]: time="2025-05-15T01:16:09.222389183Z" level=error msg="ContainerStatus for \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\": not found" May 15 01:16:09.222676 kubelet[2197]: E0515 01:16:09.222644 2197 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\": not found" containerID="fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56" May 15 01:16:09.222768 kubelet[2197]: I0515 01:16:09.222670 2197 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56"} err="failed to get container status \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\": rpc error: code = NotFound desc = an error occurred when try to find container \"fb9c94030d419891e99aa5362c15f0bff5246665903352e806dff0dcacfa9e56\": not found" May 15 01:16:09.517754 env[1250]: time="2025-05-15T01:16:09.517702316Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:09.518767 env[1250]: time="2025-05-15T01:16:09.518744616Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:09.519783 env[1250]: time="2025-05-15T01:16:09.519760016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:09.520780 env[1250]: time="2025-05-15T01:16:09.520756892Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:09.521446 env[1250]: time="2025-05-15T01:16:09.521111439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 01:16:09.540845 env[1250]: time="2025-05-15T01:16:09.540814761Z" level=info msg="CreateContainer within sandbox \"3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 01:16:09.574571 env[1250]: time="2025-05-15T01:16:09.574531286Z" level=info msg="CreateContainer within sandbox \"3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3b08c98af75b16bd4ddeef362d3894404d5cd3b22ca0c388ae49cface09adfa2\"" May 15 01:16:09.579000 env[1250]: time="2025-05-15T01:16:09.578973677Z" level=info msg="StartContainer for \"3b08c98af75b16bd4ddeef362d3894404d5cd3b22ca0c388ae49cface09adfa2\"" May 15 01:16:09.606273 systemd[1]: Started cri-containerd-3b08c98af75b16bd4ddeef362d3894404d5cd3b22ca0c388ae49cface09adfa2.scope. May 15 01:16:09.610454 systemd[1]: run-containerd-runc-k8s.io-3b08c98af75b16bd4ddeef362d3894404d5cd3b22ca0c388ae49cface09adfa2-runc.gWOBDq.mount: Deactivated successfully. May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8491d0ccc8 items=0 ppid=5807 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:09.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362303863393861663735623136626434646465656633363264333839 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit: BPF prog-id=245 op=LOAD May 15 01:16:09.624000 audit[6016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000391e88 items=0 ppid=5807 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:09.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362303863393861663735623136626434646465656633363264333839 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit: BPF prog-id=246 op=LOAD May 15 01:16:09.624000 audit[6016]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000391ed8 items=0 ppid=5807 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:09.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362303863393861663735623136626434646465656633363264333839 May 15 01:16:09.624000 audit: BPF prog-id=246 op=UNLOAD May 15 01:16:09.624000 audit: BPF prog-id=245 op=UNLOAD May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { perfmon } for pid=6016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit[6016]: AVC avc: denied { bpf } for pid=6016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:09.624000 audit: BPF prog-id=247 op=LOAD May 15 01:16:09.624000 audit[6016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000391f68 items=0 ppid=5807 pid=6016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:09.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362303863393861663735623136626434646465656633363264333839 May 15 01:16:09.637273 env[1250]: time="2025-05-15T01:16:09.637232900Z" level=info msg="StartContainer for \"3b08c98af75b16bd4ddeef362d3894404d5cd3b22ca0c388ae49cface09adfa2\" returns successfully" May 15 01:16:09.638285 env[1250]: time="2025-05-15T01:16:09.638268998Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 01:16:09.694061 kubelet[2197]: I0515 01:16:09.694035 2197 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="6cf49426-ffa5-4b87-a387-036978b1ee62" path="/var/lib/kubelet/pods/6cf49426-ffa5-4b87-a387-036978b1ee62/volumes" May 15 01:16:09.695095 kubelet[2197]: I0515 01:16:09.695080 2197 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="d8a122ac-2bdd-49bc-8377-b156b680505d" path="/var/lib/kubelet/pods/d8a122ac-2bdd-49bc-8377-b156b680505d/volumes" May 15 01:16:11.307850 env[1250]: time="2025-05-15T01:16:11.307811537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:11.308613 env[1250]: time="2025-05-15T01:16:11.308593767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:11.309565 env[1250]: time="2025-05-15T01:16:11.309549150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:11.310575 env[1250]: time="2025-05-15T01:16:11.310561843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 01:16:11.310818 env[1250]: time="2025-05-15T01:16:11.310800033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 01:16:11.312614 env[1250]: time="2025-05-15T01:16:11.312434453Z" level=info msg="CreateContainer within sandbox \"3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 01:16:11.329707 kernel: kauditd_printk_skb: 259 callbacks suppressed May 15 01:16:11.336470 kernel: audit: type=1130 audit(1747271771.324:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-147.75.109.163:60290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:11.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-147.75.109.163:60290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:11.325556 systemd[1]: Started sshd@9-139.178.70.100:22-147.75.109.163:60290.service. May 15 01:16:11.358107 env[1250]: time="2025-05-15T01:16:11.339993761Z" level=info msg="CreateContainer within sandbox \"3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"11fa37495105f9028f45ab5d19fa89e6f767f93a5055cf55fa0cf64d48f58339\"" May 15 01:16:11.358107 env[1250]: time="2025-05-15T01:16:11.340551805Z" level=info msg="StartContainer for \"11fa37495105f9028f45ab5d19fa89e6f767f93a5055cf55fa0cf64d48f58339\"" May 15 01:16:11.394449 systemd[1]: Started cri-containerd-11fa37495105f9028f45ab5d19fa89e6f767f93a5055cf55fa0cf64d48f58339.scope. May 15 01:16:11.399366 systemd[1]: run-containerd-runc-k8s.io-11fa37495105f9028f45ab5d19fa89e6f767f93a5055cf55fa0cf64d48f58339-runc.5ZkzYt.mount: Deactivated successfully. May 15 01:16:11.431000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa38a10e2f8 items=0 ppid=5807 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:11.451453 kernel: audit: type=1400 audit(1747271771.431:1557): avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.517615 kernel: audit: type=1300 audit(1747271771.431:1557): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa38a10e2f8 items=0 ppid=5807 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:11.517664 kernel: audit: type=1327 audit(1747271771.431:1557): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666133373439353130356639303238663435616235643139666138 May 15 01:16:11.517684 kernel: audit: type=1400 audit(1747271771.431:1558): avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.534590 kernel: audit: type=1400 audit(1747271771.431:1558): avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.534643 kernel: audit: type=1400 audit(1747271771.431:1558): avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.534661 kernel: audit: type=1400 audit(1747271771.431:1558): avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.587334 kernel: audit: type=1400 audit(1747271771.431:1558): avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.587385 kernel: audit: type=1400 audit(1747271771.431:1558): avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666133373439353130356639303238663435616235643139666138 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.431000 audit: BPF prog-id=248 op=LOAD May 15 01:16:11.431000 audit[6049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024e18 items=0 ppid=5807 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:11.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666133373439353130356639303238663435616235643139666138 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.437000 audit: BPF prog-id=249 op=LOAD May 15 01:16:11.437000 audit[6049]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024e68 items=0 ppid=5807 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:11.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666133373439353130356639303238663435616235643139666138 May 15 01:16:11.441000 audit: BPF prog-id=249 op=UNLOAD May 15 01:16:11.441000 audit: BPF prog-id=248 op=UNLOAD May 15 01:16:11.441000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { perfmon } for pid=6049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit[6049]: AVC avc: denied { bpf } for pid=6049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 01:16:11.441000 audit: BPF prog-id=250 op=LOAD May 15 01:16:11.441000 audit[6049]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024ef8 items=0 ppid=5807 pid=6049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:11.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666133373439353130356639303238663435616235643139666138 May 15 01:16:11.597523 env[1250]: time="2025-05-15T01:16:11.533663734Z" level=info msg="StartContainer for \"11fa37495105f9028f45ab5d19fa89e6f767f93a5055cf55fa0cf64d48f58339\" returns successfully" May 15 01:16:11.971000 audit[6042]: USER_ACCT pid=6042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:11.974000 audit[6042]: CRED_ACQ pid=6042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:11.974000 audit[6042]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7d74f600 a2=3 a3=0 items=0 ppid=1 pid=6042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:11.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:11.982809 sshd[6042]: Accepted publickey for core from 147.75.109.163 port 60290 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:11.980130 sshd[6042]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:12.005337 systemd-logind[1239]: New session 11 of user core. May 15 01:16:12.005923 systemd[1]: Started session-11.scope. May 15 01:16:12.008000 audit[6042]: USER_START pid=6042 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:12.010000 audit[6080]: CRED_ACQ pid=6080 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:12.193832 kubelet[2197]: I0515 01:16:12.171792 2197 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wtmff" podStartSLOduration=85.676369779 podStartE2EDuration="1m29.148751076s" podCreationTimestamp="2025-05-15 01:14:43 +0000 UTC" firstStartedPulling="2025-05-15 01:16:07.839050687 +0000 UTC m=+104.268267750" lastFinishedPulling="2025-05-15 01:16:11.311431984 +0000 UTC m=+107.740649047" observedRunningTime="2025-05-15 01:16:12.139543913 +0000 UTC m=+108.568760984" watchObservedRunningTime="2025-05-15 01:16:12.148751076 +0000 UTC m=+108.577968141" May 15 01:16:12.715810 kubelet[2197]: I0515 01:16:12.715785 2197 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 01:16:12.717687 kubelet[2197]: I0515 01:16:12.717667 2197 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 01:16:15.489000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:15.489000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f716c0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:16:15.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:16:15.491000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:15.491000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00176fc50 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:16:15.491000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:16:17.239000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.256181 kernel: kauditd_printk_skb: 47 callbacks suppressed May 15 01:16:17.256268 kernel: audit: type=1400 audit(1747271777.239:1570): avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.262756 kernel: audit: type=1300 audit(1747271777.239:1570): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004d07440 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.269762 kernel: audit: type=1327 audit(1747271777.239:1570): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:17.277179 kernel: audit: type=1400 audit(1747271777.246:1571): avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.277208 kernel: audit: type=1300 audit(1747271777.246:1571): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004d07740 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.277225 kernel: audit: type=1327 audit(1747271777.246:1571): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:17.291037 kernel: audit: type=1400 audit(1747271777.276:1572): avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.291077 kernel: audit: type=1300 audit(1747271777.276:1572): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c008dddd40 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.291098 kernel: audit: type=1327 audit(1747271777.276:1572): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:17.239000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004d07440 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.239000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:17.246000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.246000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004d07740 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:17.276000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.276000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c008dddd40 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:17.334000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.344514 kernel: audit: type=1400 audit(1747271777.334:1573): avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.334000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.334000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0031b6a50 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:17.334000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0031b6a20 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:17.344000 audit[2072]: AVC avc: denied { watch } for pid=2072 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:17.344000 audit[2072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0031b6a80 a2=fc6 a3=0 items=0 ppid=1918 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c165,c516 key=(null) May 15 01:16:17.344000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B May 15 01:16:19.085875 kubelet[2197]: E0515 01:16:19.085827 2197 kubelet.go:2511] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.321s" May 15 01:16:19.871940 sshd[6042]: pam_unix(sshd:session): session closed for user core May 15 01:16:19.886000 audit[6042]: USER_END pid=6042 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:19.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.100:22-147.75.109.163:35540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:19.888000 audit[6042]: CRED_DISP pid=6042 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:19.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.100:22-147.75.109.163:60290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:19.888654 systemd[1]: Started sshd@10-139.178.70.100:22-147.75.109.163:35540.service. May 15 01:16:19.912181 systemd[1]: sshd@9-139.178.70.100:22-147.75.109.163:60290.service: Deactivated successfully. May 15 01:16:19.915616 systemd[1]: session-11.scope: Deactivated successfully. May 15 01:16:19.916955 systemd-logind[1239]: Session 11 logged out. Waiting for processes to exit. May 15 01:16:19.918166 systemd-logind[1239]: Removed session 11. May 15 01:16:19.964000 audit[6124]: USER_ACCT pid=6124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:19.965000 audit[6124]: CRED_ACQ pid=6124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:19.965000 audit[6124]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdafcaf450 a2=3 a3=0 items=0 ppid=1 pid=6124 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:19.965000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:19.968997 sshd[6124]: Accepted publickey for core from 147.75.109.163 port 35540 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:19.969533 sshd[6124]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:19.979347 systemd-logind[1239]: New session 12 of user core. May 15 01:16:19.980059 systemd[1]: Started session-12.scope. May 15 01:16:19.982000 audit[6124]: USER_START pid=6124 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:19.983000 audit[6127]: CRED_ACQ pid=6127 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.177205 systemd[1]: Started sshd@11-139.178.70.100:22-147.75.109.163:35550.service. May 15 01:16:20.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.100:22-147.75.109.163:35550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:20.178867 sshd[6124]: pam_unix(sshd:session): session closed for user core May 15 01:16:20.178000 audit[6124]: USER_END pid=6124 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.179000 audit[6124]: CRED_DISP pid=6124 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.180802 systemd[1]: sshd@10-139.178.70.100:22-147.75.109.163:35540.service: Deactivated successfully. May 15 01:16:20.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.100:22-147.75.109.163:35540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:20.181364 systemd[1]: session-12.scope: Deactivated successfully. May 15 01:16:20.181805 systemd-logind[1239]: Session 12 logged out. Waiting for processes to exit. May 15 01:16:20.182433 systemd-logind[1239]: Removed session 12. May 15 01:16:20.226000 audit[6133]: USER_ACCT pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.227379 sshd[6133]: Accepted publickey for core from 147.75.109.163 port 35550 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:20.227000 audit[6133]: CRED_ACQ pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.227000 audit[6133]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed26920f0 a2=3 a3=0 items=0 ppid=1 pid=6133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:20.227000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:20.228733 sshd[6133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:20.234234 systemd-logind[1239]: New session 13 of user core. May 15 01:16:20.234842 systemd[1]: Started session-13.scope. May 15 01:16:20.238000 audit[6133]: USER_START pid=6133 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.239000 audit[6136]: CRED_ACQ pid=6136 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.348793 sshd[6133]: pam_unix(sshd:session): session closed for user core May 15 01:16:20.348000 audit[6133]: USER_END pid=6133 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.349000 audit[6133]: CRED_DISP pid=6133 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:20.350762 systemd-logind[1239]: Session 13 logged out. Waiting for processes to exit. May 15 01:16:20.350869 systemd[1]: sshd@11-139.178.70.100:22-147.75.109.163:35550.service: Deactivated successfully. May 15 01:16:20.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.100:22-147.75.109.163:35550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:20.351316 systemd[1]: session-13.scope: Deactivated successfully. May 15 01:16:20.351800 systemd-logind[1239]: Removed session 13. May 15 01:16:22.083000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:22.083000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cd4680 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:16:22.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:16:22.103000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:22.103000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cd46a0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:16:22.103000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:16:22.115000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:22.115000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cd46c0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:16:22.115000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:16:22.115000 audit[2017]: AVC avc: denied { watch } for pid=2017 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 01:16:22.115000 audit[2017]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cd47a0 a2=fc6 a3=0 items=0 ppid=1875 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c778 key=(null) May 15 01:16:22.115000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 01:16:24.857326 kubelet[2197]: E0515 01:16:24.857273 2197 kubelet.go:2511] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.169s" May 15 01:16:24.936251 kubelet[2197]: I0515 01:16:24.936224 2197 scope.go:117] "RemoveContainer" containerID="1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424" May 15 01:16:25.105070 env[1250]: time="2025-05-15T01:16:25.105028724Z" level=info msg="RemoveContainer for \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\"" May 15 01:16:25.143249 env[1250]: time="2025-05-15T01:16:25.138503630Z" level=info msg="RemoveContainer for \"1561a2e7246839c81ff5c4edf2c7372a547c6169d307875e18d333690e027424\" returns successfully" May 15 01:16:25.354925 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 01:16:25.418157 kernel: audit: type=1130 audit(1747271785.351:1601): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.100:22-147.75.109.163:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:25.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.100:22-147.75.109.163:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:25.352042 systemd[1]: Started sshd@12-139.178.70.100:22-147.75.109.163:35552.service. May 15 01:16:25.695888 env[1250]: time="2025-05-15T01:16:25.695028031Z" level=info msg="StopPodSandbox for \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\"" May 15 01:16:25.883000 audit[6148]: USER_ACCT pid=6148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:25.885000 audit[6148]: CRED_ACQ pid=6148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:25.888112 sshd[6148]: Accepted publickey for core from 147.75.109.163 port 35552 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:25.891268 kernel: audit: type=1101 audit(1747271785.883:1602): pid=6148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:25.891452 kernel: audit: type=1103 audit(1747271785.885:1603): pid=6148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:25.891481 kernel: audit: type=1006 audit(1747271785.885:1604): pid=6148 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 01:16:25.893663 sshd[6148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:25.885000 audit[6148]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc25c9ab90 a2=3 a3=0 items=0 ppid=1 pid=6148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:25.899728 kernel: audit: type=1300 audit(1747271785.885:1604): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc25c9ab90 a2=3 a3=0 items=0 ppid=1 pid=6148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:25.885000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:25.903735 kernel: audit: type=1327 audit(1747271785.885:1604): proctitle=737368643A20636F7265205B707269765D May 15 01:16:25.905290 systemd[1]: Started session-14.scope. May 15 01:16:25.906440 systemd-logind[1239]: New session 14 of user core. May 15 01:16:25.913000 audit[6148]: USER_START pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:25.919871 kernel: audit: type=1105 audit(1747271785.913:1605): pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:25.918000 audit[6168]: CRED_ACQ pid=6168 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:25.924761 kernel: audit: type=1103 audit(1747271785.918:1606): pid=6168 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:26.158355 sshd[6148]: pam_unix(sshd:session): session closed for user core May 15 01:16:26.158000 audit[6148]: USER_END pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:26.166818 kernel: audit: type=1106 audit(1747271786.158:1607): pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:26.167411 kernel: audit: type=1104 audit(1747271786.159:1608): pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:26.159000 audit[6148]: CRED_DISP pid=6148 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:26.171222 systemd-logind[1239]: Session 14 logged out. Waiting for processes to exit. May 15 01:16:26.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.100:22-147.75.109.163:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:26.171989 systemd[1]: sshd@12-139.178.70.100:22-147.75.109.163:35552.service: Deactivated successfully. May 15 01:16:26.172540 systemd[1]: session-14.scope: Deactivated successfully. May 15 01:16:26.173404 systemd-logind[1239]: Removed session 14. May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.225 [WARNING][6167] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.228 [INFO][6167] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.228 [INFO][6167] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" iface="eth0" netns="" May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.228 [INFO][6167] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.228 [INFO][6167] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.487 [INFO][6189] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.490 [INFO][6189] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.491 [INFO][6189] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.506 [WARNING][6189] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.506 [INFO][6189] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.507 [INFO][6189] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:26.510609 env[1250]: 2025-05-15 01:16:26.508 [INFO][6167] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:26.514006 env[1250]: time="2025-05-15T01:16:26.510920820Z" level=info msg="TearDown network for sandbox \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\" successfully" May 15 01:16:26.514006 env[1250]: time="2025-05-15T01:16:26.510942602Z" level=info msg="StopPodSandbox for \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\" returns successfully" May 15 01:16:26.527677 env[1250]: time="2025-05-15T01:16:26.527650547Z" level=info msg="RemovePodSandbox for \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\"" May 15 01:16:26.527916 env[1250]: time="2025-05-15T01:16:26.527886217Z" level=info msg="Forcibly stopping sandbox \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\"" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.633 [WARNING][6208] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.633 [INFO][6208] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.634 [INFO][6208] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" iface="eth0" netns="" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.634 [INFO][6208] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.634 [INFO][6208] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.653 [INFO][6215] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.653 [INFO][6215] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.653 [INFO][6215] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.659 [WARNING][6215] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.659 [INFO][6215] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" HandleID="k8s-pod-network.dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.661 [INFO][6215] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:26.664253 env[1250]: 2025-05-15 01:16:26.662 [INFO][6208] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52" May 15 01:16:26.666402 env[1250]: time="2025-05-15T01:16:26.664660135Z" level=info msg="TearDown network for sandbox \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\" successfully" May 15 01:16:26.669467 env[1250]: time="2025-05-15T01:16:26.669451480Z" level=info msg="RemovePodSandbox \"dc1abc70265017f5d24670a2168ff428615d7c543f7e3f8ee95b472a71fe6b52\" returns successfully" May 15 01:16:26.669889 env[1250]: time="2025-05-15T01:16:26.669868259Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.697 [WARNING][6233] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.697 [INFO][6233] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.697 [INFO][6233] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" iface="eth0" netns="" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.697 [INFO][6233] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.697 [INFO][6233] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.718 [INFO][6241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.718 [INFO][6241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.718 [INFO][6241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.722 [WARNING][6241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.722 [INFO][6241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.723 [INFO][6241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:26.725578 env[1250]: 2025-05-15 01:16:26.724 [INFO][6233] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:26.727478 env[1250]: time="2025-05-15T01:16:26.725598879Z" level=info msg="TearDown network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" successfully" May 15 01:16:26.727478 env[1250]: time="2025-05-15T01:16:26.725619675Z" level=info msg="StopPodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" returns successfully" May 15 01:16:26.727478 env[1250]: time="2025-05-15T01:16:26.726183574Z" level=info msg="RemovePodSandbox for \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:16:26.727478 env[1250]: time="2025-05-15T01:16:26.726203059Z" level=info msg="Forcibly stopping sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\"" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.754 [WARNING][6260] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.754 [INFO][6260] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.754 [INFO][6260] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" iface="eth0" netns="" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.754 [INFO][6260] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.754 [INFO][6260] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.768 [INFO][6267] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.768 [INFO][6267] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.768 [INFO][6267] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.773 [WARNING][6267] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.773 [INFO][6267] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" HandleID="k8s-pod-network.5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" Workload="localhost-k8s-calico--apiserver--9f4dbf687--f8xs5-eth0" May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.773 [INFO][6267] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:26.776756 env[1250]: 2025-05-15 01:16:26.774 [INFO][6260] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175" May 15 01:16:26.778019 env[1250]: time="2025-05-15T01:16:26.777246931Z" level=info msg="TearDown network for sandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" successfully" May 15 01:16:26.780743 env[1250]: time="2025-05-15T01:16:26.780727852Z" level=info msg="RemovePodSandbox \"5d7493b40dc879c5f486420863832891a4cda236c2df820d31ea650fcca9f175\" returns successfully" May 15 01:16:26.781097 env[1250]: time="2025-05-15T01:16:26.781083480Z" level=info msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.810 [WARNING][6286] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0", GenerateName:"calico-apiserver-6b8cc979fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"8907c9d9-e315-4aa9-8a30-55983de20102", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b8cc979fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452", Pod:"calico-apiserver-6b8cc979fc-pg889", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia64dafd3141", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.810 [INFO][6286] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.810 [INFO][6286] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" iface="eth0" netns="" May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.810 [INFO][6286] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.810 [INFO][6286] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.832 [INFO][6293] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.832 [INFO][6293] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.832 [INFO][6293] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.836 [WARNING][6293] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.836 [INFO][6293] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.837 [INFO][6293] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:26.839336 env[1250]: 2025-05-15 01:16:26.838 [INFO][6286] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:16:26.857228 env[1250]: time="2025-05-15T01:16:26.839356449Z" level=info msg="TearDown network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" successfully" May 15 01:16:26.857228 env[1250]: time="2025-05-15T01:16:26.839377901Z" level=info msg="StopPodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" returns successfully" May 15 01:16:26.857228 env[1250]: time="2025-05-15T01:16:26.839870432Z" level=info msg="RemovePodSandbox for \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" May 15 01:16:26.857228 env[1250]: time="2025-05-15T01:16:26.839931213Z" level=info msg="Forcibly stopping sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\"" May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.865 [WARNING][6311] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0", GenerateName:"calico-apiserver-6b8cc979fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"8907c9d9-e315-4aa9-8a30-55983de20102", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b8cc979fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f7f081732cf11b73e858ee21454fcb7f19f74ddc768902eae54a9d8afff57452", Pod:"calico-apiserver-6b8cc979fc-pg889", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia64dafd3141", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.865 [INFO][6311] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.865 [INFO][6311] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" iface="eth0" netns="" May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.865 [INFO][6311] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.865 [INFO][6311] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.881 [INFO][6319] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.881 [INFO][6319] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.881 [INFO][6319] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.884 [WARNING][6319] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.885 [INFO][6319] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" HandleID="k8s-pod-network.6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" Workload="localhost-k8s-calico--apiserver--6b8cc979fc--pg889-eth0" May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.885 [INFO][6319] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:26.888220 env[1250]: 2025-05-15 01:16:26.887 [INFO][6311] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53" May 15 01:16:26.889223 env[1250]: time="2025-05-15T01:16:26.888365099Z" level=info msg="TearDown network for sandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" successfully" May 15 01:16:26.934094 env[1250]: time="2025-05-15T01:16:26.934045413Z" level=info msg="RemovePodSandbox \"6da6065a9c7cf512a85729de0f864dba6b6841cbc2817ed0fb45898ea03bea53\" returns successfully" May 15 01:16:26.934529 env[1250]: time="2025-05-15T01:16:26.934505666Z" level=info msg="StopPodSandbox for \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\"" May 15 01:16:26.934680 env[1250]: time="2025-05-15T01:16:26.934653873Z" level=info msg="TearDown network for sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" successfully" May 15 01:16:26.934805 env[1250]: time="2025-05-15T01:16:26.934781304Z" level=info msg="StopPodSandbox for \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" returns successfully" May 15 01:16:26.935017 env[1250]: time="2025-05-15T01:16:26.935005021Z" level=info msg="RemovePodSandbox for \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\"" May 15 01:16:26.935090 env[1250]: time="2025-05-15T01:16:26.935069098Z" level=info msg="Forcibly stopping sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\"" May 15 01:16:26.935163 env[1250]: time="2025-05-15T01:16:26.935151345Z" level=info msg="TearDown network for sandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" successfully" May 15 01:16:26.940311 env[1250]: time="2025-05-15T01:16:26.940278578Z" level=info msg="RemovePodSandbox \"2f38fc93ad5522e467cdc5e05ceba2b96bc942117dc0333fb5ff6f5511e13265\" returns successfully" May 15 01:16:26.940684 env[1250]: time="2025-05-15T01:16:26.940671475Z" level=info msg="StopPodSandbox for \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\"" May 15 01:16:26.940944 env[1250]: time="2025-05-15T01:16:26.940781038Z" level=info msg="TearDown network for sandbox \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\" successfully" May 15 01:16:26.940944 env[1250]: time="2025-05-15T01:16:26.940812036Z" level=info msg="StopPodSandbox for \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\" returns successfully" May 15 01:16:26.941115 env[1250]: time="2025-05-15T01:16:26.941097114Z" level=info msg="RemovePodSandbox for \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\"" May 15 01:16:26.941226 env[1250]: time="2025-05-15T01:16:26.941195648Z" level=info msg="Forcibly stopping sandbox \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\"" May 15 01:16:26.941304 env[1250]: time="2025-05-15T01:16:26.941292207Z" level=info msg="TearDown network for sandbox \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\" successfully" May 15 01:16:26.943849 env[1250]: time="2025-05-15T01:16:26.943834958Z" level=info msg="RemovePodSandbox \"c3df98f863fbbf3fcacf2ba948fd69c28a474085451e5bc2418c780602b31533\" returns successfully" May 15 01:16:26.944123 env[1250]: time="2025-05-15T01:16:26.944106574Z" level=info msg="StopPodSandbox for \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\"" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.970 [WARNING][6337] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.970 [INFO][6337] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.971 [INFO][6337] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" iface="eth0" netns="" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.971 [INFO][6337] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.971 [INFO][6337] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.984 [INFO][6344] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.984 [INFO][6344] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.984 [INFO][6344] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.988 [WARNING][6344] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.988 [INFO][6344] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.989 [INFO][6344] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:26.992480 env[1250]: 2025-05-15 01:16:26.991 [INFO][6337] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:26.994454 env[1250]: time="2025-05-15T01:16:26.992506364Z" level=info msg="TearDown network for sandbox \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\" successfully" May 15 01:16:26.994454 env[1250]: time="2025-05-15T01:16:26.992531771Z" level=info msg="StopPodSandbox for \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\" returns successfully" May 15 01:16:26.994454 env[1250]: time="2025-05-15T01:16:26.992985340Z" level=info msg="RemovePodSandbox for \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\"" May 15 01:16:26.994454 env[1250]: time="2025-05-15T01:16:26.993002350Z" level=info msg="Forcibly stopping sandbox \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\"" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.017 [WARNING][6362] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.017 [INFO][6362] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.017 [INFO][6362] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" iface="eth0" netns="" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.017 [INFO][6362] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.017 [INFO][6362] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.032 [INFO][6370] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.032 [INFO][6370] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.032 [INFO][6370] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.036 [WARNING][6370] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.036 [INFO][6370] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" HandleID="k8s-pod-network.0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.037 [INFO][6370] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.039917 env[1250]: 2025-05-15 01:16:27.038 [INFO][6362] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4" May 15 01:16:27.053680 env[1250]: time="2025-05-15T01:16:27.039899273Z" level=info msg="TearDown network for sandbox \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\" successfully" May 15 01:16:27.073652 env[1250]: time="2025-05-15T01:16:27.073593220Z" level=info msg="RemovePodSandbox \"0d8d0c6a2b360e803beb51aab18f71be710700841e30c4c11bdfd279484c1bf4\" returns successfully" May 15 01:16:27.074529 env[1250]: time="2025-05-15T01:16:27.074508089Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.116 [WARNING][6389] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.118 [INFO][6389] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.118 [INFO][6389] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" iface="eth0" netns="" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.118 [INFO][6389] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.118 [INFO][6389] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.134 [INFO][6398] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.134 [INFO][6398] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.134 [INFO][6398] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.138 [WARNING][6398] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.138 [INFO][6398] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.139 [INFO][6398] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.142717 env[1250]: 2025-05-15 01:16:27.141 [INFO][6389] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:27.155379 env[1250]: time="2025-05-15T01:16:27.142790611Z" level=info msg="TearDown network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" successfully" May 15 01:16:27.155379 env[1250]: time="2025-05-15T01:16:27.142817731Z" level=info msg="StopPodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" returns successfully" May 15 01:16:27.155379 env[1250]: time="2025-05-15T01:16:27.143207887Z" level=info msg="RemovePodSandbox for \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:16:27.155379 env[1250]: time="2025-05-15T01:16:27.143227196Z" level=info msg="Forcibly stopping sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\"" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.168 [WARNING][6416] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" WorkloadEndpoint="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.169 [INFO][6416] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.169 [INFO][6416] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" iface="eth0" netns="" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.169 [INFO][6416] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.169 [INFO][6416] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.188 [INFO][6424] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.188 [INFO][6424] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.188 [INFO][6424] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.193 [WARNING][6424] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.193 [INFO][6424] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" HandleID="k8s-pod-network.deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" Workload="localhost-k8s-calico--apiserver--9f4dbf687--7rvxc-eth0" May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.194 [INFO][6424] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.197024 env[1250]: 2025-05-15 01:16:27.195 [INFO][6416] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a" May 15 01:16:27.204388 env[1250]: time="2025-05-15T01:16:27.197046981Z" level=info msg="TearDown network for sandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" successfully" May 15 01:16:27.222034 env[1250]: time="2025-05-15T01:16:27.221998493Z" level=info msg="RemovePodSandbox \"deb6b5408ee8c3b63819289943f41c6769fb4d1efad0eb320d81ae2b1dd2af0a\" returns successfully" May 15 01:16:27.222415 env[1250]: time="2025-05-15T01:16:27.222399175Z" level=info msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.270 [WARNING][6443] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"13a79e40-372b-4208-b918-f3767f012b11", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15", Pod:"coredns-7db6d8ff4d-nvxb8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib78adc870f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.270 [INFO][6443] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.270 [INFO][6443] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" iface="eth0" netns="" May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.270 [INFO][6443] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.270 [INFO][6443] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.286 [INFO][6450] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.286 [INFO][6450] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.286 [INFO][6450] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.298 [WARNING][6450] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.298 [INFO][6450] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.309 [INFO][6450] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.311706 env[1250]: 2025-05-15 01:16:27.310 [INFO][6443] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:16:27.312754 env[1250]: time="2025-05-15T01:16:27.311681129Z" level=info msg="TearDown network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" successfully" May 15 01:16:27.312845 env[1250]: time="2025-05-15T01:16:27.312831629Z" level=info msg="StopPodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" returns successfully" May 15 01:16:27.313234 env[1250]: time="2025-05-15T01:16:27.313220920Z" level=info msg="RemovePodSandbox for \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" May 15 01:16:27.313324 env[1250]: time="2025-05-15T01:16:27.313298576Z" level=info msg="Forcibly stopping sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\"" May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.337 [WARNING][6468] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"13a79e40-372b-4208-b918-f3767f012b11", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0e83933a905e62b3192ed241f58b912c880958ed819572d51acaabcbc0d58e15", Pod:"coredns-7db6d8ff4d-nvxb8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib78adc870f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.337 [INFO][6468] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.337 [INFO][6468] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" iface="eth0" netns="" May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.337 [INFO][6468] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.337 [INFO][6468] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.362 [INFO][6475] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.362 [INFO][6475] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.362 [INFO][6475] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.366 [WARNING][6475] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.366 [INFO][6475] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" HandleID="k8s-pod-network.467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" Workload="localhost-k8s-coredns--7db6d8ff4d--nvxb8-eth0" May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.367 [INFO][6475] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.369603 env[1250]: 2025-05-15 01:16:27.368 [INFO][6468] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc" May 15 01:16:27.382304 env[1250]: time="2025-05-15T01:16:27.369867704Z" level=info msg="TearDown network for sandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" successfully" May 15 01:16:27.415233 env[1250]: time="2025-05-15T01:16:27.415080127Z" level=info msg="RemovePodSandbox \"467deeff38e12305b8c42b6516a5aae97fe6e5df9884861a8e7dcbb758e003bc\" returns successfully" May 15 01:16:27.415635 env[1250]: time="2025-05-15T01:16:27.415592996Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.465 [WARNING][6494] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.465 [INFO][6494] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.465 [INFO][6494] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" iface="eth0" netns="" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.465 [INFO][6494] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.465 [INFO][6494] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.483 [INFO][6501] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.483 [INFO][6501] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.483 [INFO][6501] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.488 [WARNING][6501] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.488 [INFO][6501] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.490 [INFO][6501] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.493150 env[1250]: 2025-05-15 01:16:27.491 [INFO][6494] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:16:27.493653 env[1250]: time="2025-05-15T01:16:27.493628732Z" level=info msg="TearDown network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" successfully" May 15 01:16:27.493770 env[1250]: time="2025-05-15T01:16:27.493757872Z" level=info msg="StopPodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" returns successfully" May 15 01:16:27.494614 env[1250]: time="2025-05-15T01:16:27.494578705Z" level=info msg="RemovePodSandbox for \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:16:27.494690 env[1250]: time="2025-05-15T01:16:27.494615428Z" level=info msg="Forcibly stopping sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\"" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.526 [WARNING][6520] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.526 [INFO][6520] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.526 [INFO][6520] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" iface="eth0" netns="" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.526 [INFO][6520] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.526 [INFO][6520] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.547 [INFO][6527] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.547 [INFO][6527] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.548 [INFO][6527] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.552 [WARNING][6527] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.552 [INFO][6527] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" HandleID="k8s-pod-network.f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" Workload="localhost-k8s-calico--kube--controllers--6bdb6bd8f9--8g6q8-eth0" May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.553 [INFO][6527] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.556111 env[1250]: 2025-05-15 01:16:27.554 [INFO][6520] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480" May 15 01:16:27.556685 env[1250]: time="2025-05-15T01:16:27.556124935Z" level=info msg="TearDown network for sandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" successfully" May 15 01:16:27.558960 env[1250]: time="2025-05-15T01:16:27.558929475Z" level=info msg="RemovePodSandbox \"f5df1c2f25257eebfc5d0fd6d7462ef65222618bcac533f1d89ab8af5dd71480\" returns successfully" May 15 01:16:27.559271 env[1250]: time="2025-05-15T01:16:27.559245549Z" level=info msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.591 [WARNING][6545] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8e0cc1c0-23db-422e-a082-8c150da20907", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb", Pod:"coredns-7db6d8ff4d-f8grq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid9ac5c7eda2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.591 [INFO][6545] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.591 [INFO][6545] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" iface="eth0" netns="" May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.591 [INFO][6545] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.591 [INFO][6545] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.610 [INFO][6553] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.610 [INFO][6553] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.610 [INFO][6553] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.614 [WARNING][6553] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.614 [INFO][6553] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.615 [INFO][6553] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.619781 env[1250]: 2025-05-15 01:16:27.617 [INFO][6545] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:16:27.620501 env[1250]: time="2025-05-15T01:16:27.620142205Z" level=info msg="TearDown network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" successfully" May 15 01:16:27.620501 env[1250]: time="2025-05-15T01:16:27.620186486Z" level=info msg="StopPodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" returns successfully" May 15 01:16:27.620877 env[1250]: time="2025-05-15T01:16:27.620863551Z" level=info msg="RemovePodSandbox for \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" May 15 01:16:27.621005 env[1250]: time="2025-05-15T01:16:27.620979840Z" level=info msg="Forcibly stopping sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\"" May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.650 [WARNING][6572] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8e0cc1c0-23db-422e-a082-8c150da20907", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"14c56c6f2898284b58ff5085e5e28e176c17d160881eabb09a520107265499fb", Pod:"coredns-7db6d8ff4d-f8grq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid9ac5c7eda2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.650 [INFO][6572] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.650 [INFO][6572] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" iface="eth0" netns="" May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.650 [INFO][6572] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.650 [INFO][6572] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.665 [INFO][6579] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.665 [INFO][6579] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.665 [INFO][6579] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.669 [WARNING][6579] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.669 [INFO][6579] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" HandleID="k8s-pod-network.3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" Workload="localhost-k8s-coredns--7db6d8ff4d--f8grq-eth0" May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.670 [INFO][6579] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.672893 env[1250]: 2025-05-15 01:16:27.671 [INFO][6572] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733" May 15 01:16:27.673663 env[1250]: time="2025-05-15T01:16:27.673337023Z" level=info msg="TearDown network for sandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" successfully" May 15 01:16:27.675049 env[1250]: time="2025-05-15T01:16:27.675030575Z" level=info msg="RemovePodSandbox \"3cc557e8e0eaa63ce90855f7750f8d8dbc8a9b044bfdd8b89f2015317367c733\" returns successfully" May 15 01:16:27.675523 env[1250]: time="2025-05-15T01:16:27.675491473Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.707 [WARNING][6597] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wtmff-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f", ResourceVersion:"1275", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b", Pod:"csi-node-driver-wtmff", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali254f34687a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.707 [INFO][6597] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.707 [INFO][6597] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" iface="eth0" netns="" May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.707 [INFO][6597] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.707 [INFO][6597] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.722 [INFO][6604] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.722 [INFO][6604] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.722 [INFO][6604] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.727 [WARNING][6604] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.727 [INFO][6604] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.728 [INFO][6604] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.730748 env[1250]: 2025-05-15 01:16:27.729 [INFO][6597] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:27.731549 env[1250]: time="2025-05-15T01:16:27.730994325Z" level=info msg="TearDown network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" successfully" May 15 01:16:27.731549 env[1250]: time="2025-05-15T01:16:27.731017576Z" level=info msg="StopPodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" returns successfully" May 15 01:16:27.731549 env[1250]: time="2025-05-15T01:16:27.731385211Z" level=info msg="RemovePodSandbox for \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:16:27.731549 env[1250]: time="2025-05-15T01:16:27.731407348Z" level=info msg="Forcibly stopping sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\"" May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.759 [WARNING][6623] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--wtmff-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb8fa4fa-c090-4fc9-9efe-29e402cdd32f", ResourceVersion:"1275", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 1, 14, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3af77334a714b8b321931c31dd9589880eeb7fc87de2212b2f9ef4a246e4415b", Pod:"csi-node-driver-wtmff", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali254f34687a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.759 [INFO][6623] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.759 [INFO][6623] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" iface="eth0" netns="" May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.759 [INFO][6623] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.759 [INFO][6623] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.776 [INFO][6631] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.776 [INFO][6631] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.777 [INFO][6631] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.781 [WARNING][6631] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.781 [INFO][6631] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" HandleID="k8s-pod-network.eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" Workload="localhost-k8s-csi--node--driver--wtmff-eth0" May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.782 [INFO][6631] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 01:16:27.784466 env[1250]: 2025-05-15 01:16:27.783 [INFO][6623] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd" May 15 01:16:27.785124 env[1250]: time="2025-05-15T01:16:27.784488414Z" level=info msg="TearDown network for sandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" successfully" May 15 01:16:27.786066 env[1250]: time="2025-05-15T01:16:27.786047660Z" level=info msg="RemovePodSandbox \"eb26e17e447554894d44a7a5a3d8a2f617d7d8d4143d2389c3eb8744e43107dd\" returns successfully" May 15 01:16:31.165386 systemd[1]: Started sshd@13-139.178.70.100:22-147.75.109.163:45882.service. May 15 01:16:31.173346 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 01:16:31.174789 kernel: audit: type=1130 audit(1747271791.164:1610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.100:22-147.75.109.163:45882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:31.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.100:22-147.75.109.163:45882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:31.250000 audit[6658]: USER_ACCT pid=6658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.254963 sshd[6658]: Accepted publickey for core from 147.75.109.163 port 45882 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:31.254000 audit[6658]: CRED_ACQ pid=6658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.258354 kernel: audit: type=1101 audit(1747271791.250:1611): pid=6658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.258401 kernel: audit: type=1103 audit(1747271791.254:1612): pid=6658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.258421 kernel: audit: type=1006 audit(1747271791.254:1613): pid=6658 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 01:16:31.254000 audit[6658]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5baf6a70 a2=3 a3=0 items=0 ppid=1 pid=6658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:31.265867 kernel: audit: type=1300 audit(1747271791.254:1613): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5baf6a70 a2=3 a3=0 items=0 ppid=1 pid=6658 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:31.265909 kernel: audit: type=1327 audit(1747271791.254:1613): proctitle=737368643A20636F7265205B707269765D May 15 01:16:31.254000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:31.265562 sshd[6658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:31.271173 systemd[1]: Started session-15.scope. May 15 01:16:31.271993 systemd-logind[1239]: New session 15 of user core. May 15 01:16:31.274000 audit[6658]: USER_START pid=6658 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.281878 kernel: audit: type=1105 audit(1747271791.274:1614): pid=6658 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.281918 kernel: audit: type=1103 audit(1747271791.274:1615): pid=6660 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.274000 audit[6660]: CRED_ACQ pid=6660 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.907364 sshd[6658]: pam_unix(sshd:session): session closed for user core May 15 01:16:31.907000 audit[6658]: USER_END pid=6658 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.915884 kernel: audit: type=1106 audit(1747271791.907:1616): pid=6658 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.916371 kernel: audit: type=1104 audit(1747271791.909:1617): pid=6658 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.909000 audit[6658]: CRED_DISP pid=6658 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:31.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.100:22-147.75.109.163:45882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:31.913341 systemd-logind[1239]: Session 15 logged out. Waiting for processes to exit. May 15 01:16:31.914163 systemd[1]: sshd@13-139.178.70.100:22-147.75.109.163:45882.service: Deactivated successfully. May 15 01:16:31.914611 systemd[1]: session-15.scope: Deactivated successfully. May 15 01:16:31.915337 systemd-logind[1239]: Removed session 15. May 15 01:16:36.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-147.75.109.163:45898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:36.910707 systemd[1]: Started sshd@14-139.178.70.100:22-147.75.109.163:45898.service. May 15 01:16:36.915670 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 01:16:36.915735 kernel: audit: type=1130 audit(1747271796.910:1619): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-147.75.109.163:45898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:37.065000 audit[6675]: USER_ACCT pid=6675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:37.073383 kernel: audit: type=1101 audit(1747271797.065:1620): pid=6675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:37.084080 kernel: audit: type=1103 audit(1747271797.069:1621): pid=6675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:37.084135 kernel: audit: type=1006 audit(1747271797.073:1622): pid=6675 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 01:16:37.084156 kernel: audit: type=1300 audit(1747271797.073:1622): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d654900 a2=3 a3=0 items=0 ppid=1 pid=6675 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:37.084246 kernel: audit: type=1327 audit(1747271797.073:1622): proctitle=737368643A20636F7265205B707269765D May 15 01:16:37.069000 audit[6675]: CRED_ACQ pid=6675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:37.073000 audit[6675]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d654900 a2=3 a3=0 items=0 ppid=1 pid=6675 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:37.073000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:37.094289 sshd[6675]: Accepted publickey for core from 147.75.109.163 port 45898 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:37.083821 sshd[6675]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:37.106222 systemd-logind[1239]: New session 16 of user core. May 15 01:16:37.106965 systemd[1]: Started session-16.scope. May 15 01:16:37.109000 audit[6675]: USER_START pid=6675 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:37.109000 audit[6677]: CRED_ACQ pid=6677 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:37.117454 kernel: audit: type=1105 audit(1747271797.109:1623): pid=6675 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:37.117497 kernel: audit: type=1103 audit(1747271797.109:1624): pid=6677 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:38.198559 sshd[6675]: pam_unix(sshd:session): session closed for user core May 15 01:16:38.220989 kernel: audit: type=1106 audit(1747271798.198:1625): pid=6675 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:38.221053 kernel: audit: type=1104 audit(1747271798.198:1626): pid=6675 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:38.198000 audit[6675]: USER_END pid=6675 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:38.198000 audit[6675]: CRED_DISP pid=6675 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:38.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.100:22-147.75.109.163:45898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:38.203370 systemd[1]: sshd@14-139.178.70.100:22-147.75.109.163:45898.service: Deactivated successfully. May 15 01:16:38.203935 systemd[1]: session-16.scope: Deactivated successfully. May 15 01:16:38.207215 systemd-logind[1239]: Session 16 logged out. Waiting for processes to exit. May 15 01:16:38.207781 systemd-logind[1239]: Removed session 16. May 15 01:16:43.184674 systemd[1]: Started sshd@15-139.178.70.100:22-147.75.109.163:36592.service. May 15 01:16:43.189729 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 01:16:43.189845 kernel: audit: type=1130 audit(1747271803.185:1628): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-147.75.109.163:36592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:43.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-147.75.109.163:36592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:43.266000 audit[6689]: USER_ACCT pid=6689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.268759 sshd[6689]: Accepted publickey for core from 147.75.109.163 port 36592 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:43.270727 kernel: audit: type=1101 audit(1747271803.266:1629): pid=6689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.270000 audit[6689]: CRED_ACQ pid=6689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.272365 sshd[6689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:43.276331 kernel: audit: type=1103 audit(1747271803.270:1630): pid=6689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.276377 kernel: audit: type=1006 audit(1747271803.270:1631): pid=6689 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 01:16:43.277030 kernel: audit: type=1300 audit(1747271803.270:1631): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe588d0ba0 a2=3 a3=0 items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:43.270000 audit[6689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe588d0ba0 a2=3 a3=0 items=0 ppid=1 pid=6689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:43.279794 kernel: audit: type=1327 audit(1747271803.270:1631): proctitle=737368643A20636F7265205B707269765D May 15 01:16:43.270000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:43.279535 systemd[1]: Started session-17.scope. May 15 01:16:43.280583 systemd-logind[1239]: New session 17 of user core. May 15 01:16:43.282000 audit[6689]: USER_START pid=6689 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.282000 audit[6691]: CRED_ACQ pid=6691 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.290278 kernel: audit: type=1105 audit(1747271803.282:1632): pid=6689 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.290493 kernel: audit: type=1103 audit(1747271803.282:1633): pid=6691 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-147.75.109.163:36602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:43.454117 systemd[1]: Started sshd@16-139.178.70.100:22-147.75.109.163:36602.service. May 15 01:16:43.457382 sshd[6689]: pam_unix(sshd:session): session closed for user core May 15 01:16:43.457738 kernel: audit: type=1130 audit(1747271803.453:1634): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-147.75.109.163:36602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:43.458000 audit[6689]: USER_END pid=6689 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.460726 systemd-logind[1239]: Session 17 logged out. Waiting for processes to exit. May 15 01:16:43.461549 systemd[1]: sshd@15-139.178.70.100:22-147.75.109.163:36592.service: Deactivated successfully. May 15 01:16:43.461977 systemd[1]: session-17.scope: Deactivated successfully. May 15 01:16:43.462787 systemd-logind[1239]: Removed session 17. May 15 01:16:43.458000 audit[6689]: CRED_DISP pid=6689 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.100:22-147.75.109.163:36592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:43.463744 kernel: audit: type=1106 audit(1747271803.458:1635): pid=6689 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.495000 audit[6700]: USER_ACCT pid=6700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.497813 sshd[6700]: Accepted publickey for core from 147.75.109.163 port 36602 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:43.497000 audit[6700]: CRED_ACQ pid=6700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.497000 audit[6700]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeab2d8a00 a2=3 a3=0 items=0 ppid=1 pid=6700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:43.497000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:43.498692 sshd[6700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:43.504236 systemd-logind[1239]: New session 18 of user core. May 15 01:16:43.504804 systemd[1]: Started session-18.scope. May 15 01:16:43.508000 audit[6700]: USER_START pid=6700 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.509000 audit[6703]: CRED_ACQ pid=6703 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.958381 systemd[1]: Started sshd@17-139.178.70.100:22-147.75.109.163:36616.service. May 15 01:16:43.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-147.75.109.163:36616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:43.964205 sshd[6700]: pam_unix(sshd:session): session closed for user core May 15 01:16:43.964000 audit[6700]: USER_END pid=6700 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.965000 audit[6700]: CRED_DISP pid=6700 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:43.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.100:22-147.75.109.163:36602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:43.972023 systemd-logind[1239]: Session 18 logged out. Waiting for processes to exit. May 15 01:16:43.972131 systemd[1]: sshd@16-139.178.70.100:22-147.75.109.163:36602.service: Deactivated successfully. May 15 01:16:43.972626 systemd[1]: session-18.scope: Deactivated successfully. May 15 01:16:43.973152 systemd-logind[1239]: Removed session 18. May 15 01:16:44.017000 audit[6710]: USER_ACCT pid=6710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:44.018944 sshd[6710]: Accepted publickey for core from 147.75.109.163 port 36616 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:44.018000 audit[6710]: CRED_ACQ pid=6710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:44.018000 audit[6710]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe79c88bb0 a2=3 a3=0 items=0 ppid=1 pid=6710 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:44.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:44.019612 sshd[6710]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:44.022669 systemd-logind[1239]: New session 19 of user core. May 15 01:16:44.023513 systemd[1]: Started session-19.scope. May 15 01:16:44.026000 audit[6710]: USER_START pid=6710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:44.027000 audit[6713]: CRED_ACQ pid=6713 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:44.340827 systemd[1]: run-containerd-runc-k8s.io-e6349d47b483e82c28056ce77a1820e0269600ad48f42ed4468eca811749074e-runc.qNkiAM.mount: Deactivated successfully. May 15 01:16:47.379000 audit[6744]: NETFILTER_CFG table=filter:140 family=2 entries=20 op=nft_register_rule pid=6744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:47.379000 audit[6744]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd958d04e0 a2=0 a3=7ffd958d04cc items=0 ppid=2330 pid=6744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:47.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:47.394000 audit[6744]: NETFILTER_CFG table=nat:141 family=2 entries=22 op=nft_register_rule pid=6744 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:47.394000 audit[6744]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd958d04e0 a2=0 a3=0 items=0 ppid=2330 pid=6744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:47.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:47.405000 audit[6746]: NETFILTER_CFG table=filter:142 family=2 entries=32 op=nft_register_rule pid=6746 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:47.405000 audit[6746]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd8c130d80 a2=0 a3=7ffd8c130d6c items=0 ppid=2330 pid=6746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:47.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:47.411000 audit[6746]: NETFILTER_CFG table=nat:143 family=2 entries=22 op=nft_register_rule pid=6746 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:47.411000 audit[6746]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd8c130d80 a2=0 a3=0 items=0 ppid=2330 pid=6746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:47.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:47.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-147.75.109.163:36632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:47.477000 audit[6710]: USER_END pid=6710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:47.478000 audit[6710]: CRED_DISP pid=6710 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:47.449402 sshd[6710]: pam_unix(sshd:session): session closed for user core May 15 01:16:47.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.100:22-147.75.109.163:36616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:47.472039 systemd[1]: Started sshd@18-139.178.70.100:22-147.75.109.163:36632.service. May 15 01:16:47.488291 systemd[1]: sshd@17-139.178.70.100:22-147.75.109.163:36616.service: Deactivated successfully. May 15 01:16:47.488824 systemd[1]: session-19.scope: Deactivated successfully. May 15 01:16:47.490539 systemd-logind[1239]: Session 19 logged out. Waiting for processes to exit. May 15 01:16:47.491593 systemd-logind[1239]: Removed session 19. May 15 01:16:47.620000 audit[6748]: USER_ACCT pid=6748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:47.621000 audit[6748]: CRED_ACQ pid=6748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:47.621000 audit[6748]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3b6fa060 a2=3 a3=0 items=0 ppid=1 pid=6748 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:47.621000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:47.641241 sshd[6748]: Accepted publickey for core from 147.75.109.163 port 36632 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:47.639398 sshd[6748]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:47.657873 systemd[1]: Started session-20.scope. May 15 01:16:47.658871 systemd-logind[1239]: New session 20 of user core. May 15 01:16:47.661000 audit[6748]: USER_START pid=6748 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:47.663000 audit[6751]: CRED_ACQ pid=6751 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.019715 sshd[6748]: pam_unix(sshd:session): session closed for user core May 15 01:16:51.067076 kernel: kauditd_printk_skb: 43 callbacks suppressed May 15 01:16:51.073918 kernel: audit: type=1130 audit(1747271811.035:1665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-147.75.109.163:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:51.075557 kernel: audit: type=1106 audit(1747271811.041:1666): pid=6748 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.075593 kernel: audit: type=1104 audit(1747271811.046:1667): pid=6748 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.075634 kernel: audit: type=1131 audit(1747271811.062:1668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-147.75.109.163:36632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:51.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-147.75.109.163:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:51.041000 audit[6748]: USER_END pid=6748 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.046000 audit[6748]: CRED_DISP pid=6748 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.100:22-147.75.109.163:36632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:51.035926 systemd[1]: Started sshd@19-139.178.70.100:22-147.75.109.163:54694.service. May 15 01:16:51.063037 systemd[1]: sshd@18-139.178.70.100:22-147.75.109.163:36632.service: Deactivated successfully. May 15 01:16:51.063587 systemd[1]: session-20.scope: Deactivated successfully. May 15 01:16:51.064346 systemd-logind[1239]: Session 20 logged out. Waiting for processes to exit. May 15 01:16:51.066930 systemd-logind[1239]: Removed session 20. May 15 01:16:51.120000 audit[6761]: USER_ACCT pid=6761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.124843 sshd[6761]: Accepted publickey for core from 147.75.109.163 port 54694 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:51.125722 kernel: audit: type=1101 audit(1747271811.120:1669): pid=6761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.125000 audit[6761]: CRED_ACQ pid=6761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.130931 kernel: audit: type=1103 audit(1747271811.125:1670): pid=6761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.130975 kernel: audit: type=1006 audit(1747271811.125:1671): pid=6761 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 15 01:16:51.131001 kernel: audit: type=1300 audit(1747271811.125:1671): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff569e07e0 a2=3 a3=0 items=0 ppid=1 pid=6761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:51.125000 audit[6761]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff569e07e0 a2=3 a3=0 items=0 ppid=1 pid=6761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:51.136207 kernel: audit: type=1327 audit(1747271811.125:1671): proctitle=737368643A20636F7265205B707269765D May 15 01:16:51.125000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:51.134622 sshd[6761]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:51.139891 systemd[1]: Started session-21.scope. May 15 01:16:51.140765 systemd-logind[1239]: New session 21 of user core. May 15 01:16:51.143000 audit[6761]: USER_START pid=6761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.148164 kernel: audit: type=1105 audit(1747271811.143:1672): pid=6761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.147000 audit[6764]: CRED_ACQ pid=6764 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.499201 sshd[6761]: pam_unix(sshd:session): session closed for user core May 15 01:16:51.499000 audit[6761]: USER_END pid=6761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.499000 audit[6761]: CRED_DISP pid=6761 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:51.501861 systemd[1]: sshd@19-139.178.70.100:22-147.75.109.163:54694.service: Deactivated successfully. May 15 01:16:51.502348 systemd[1]: session-21.scope: Deactivated successfully. May 15 01:16:51.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.100:22-147.75.109.163:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:51.503041 systemd-logind[1239]: Session 21 logged out. Waiting for processes to exit. May 15 01:16:51.503558 systemd-logind[1239]: Removed session 21. May 15 01:16:52.598000 audit[6774]: NETFILTER_CFG table=filter:144 family=2 entries=20 op=nft_register_rule pid=6774 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:52.598000 audit[6774]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe7d28a1f0 a2=0 a3=7ffe7d28a1dc items=0 ppid=2330 pid=6774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:52.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:52.603000 audit[6774]: NETFILTER_CFG table=nat:145 family=2 entries=106 op=nft_register_chain pid=6774 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 01:16:52.603000 audit[6774]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe7d28a1f0 a2=0 a3=7ffe7d28a1dc items=0 ppid=2330 pid=6774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:52.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 01:16:56.503116 systemd[1]: Started sshd@20-139.178.70.100:22-147.75.109.163:54696.service. May 15 01:16:56.507223 kernel: kauditd_printk_skb: 10 callbacks suppressed May 15 01:16:56.507284 kernel: audit: type=1130 audit(1747271816.502:1679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-147.75.109.163:54696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:56.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-147.75.109.163:54696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:56.573000 audit[6779]: USER_ACCT pid=6779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.578072 kernel: audit: type=1101 audit(1747271816.573:1680): pid=6779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.578106 sshd[6779]: Accepted publickey for core from 147.75.109.163 port 54696 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:16:56.578000 audit[6779]: CRED_ACQ pid=6779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.583822 kernel: audit: type=1103 audit(1747271816.578:1681): pid=6779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.583868 kernel: audit: type=1006 audit(1747271816.578:1682): pid=6779 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 01:16:56.588301 kernel: audit: type=1300 audit(1747271816.578:1682): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb5ea60d0 a2=3 a3=0 items=0 ppid=1 pid=6779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:56.588330 kernel: audit: type=1327 audit(1747271816.578:1682): proctitle=737368643A20636F7265205B707269765D May 15 01:16:56.578000 audit[6779]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb5ea60d0 a2=3 a3=0 items=0 ppid=1 pid=6779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:16:56.578000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:16:56.588527 sshd[6779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:16:56.592804 systemd[1]: Started session-22.scope. May 15 01:16:56.593638 systemd-logind[1239]: New session 22 of user core. May 15 01:16:56.595000 audit[6779]: USER_START pid=6779 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.599000 audit[6781]: CRED_ACQ pid=6781 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.607805 kernel: audit: type=1105 audit(1747271816.595:1683): pid=6779 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.607865 kernel: audit: type=1103 audit(1747271816.599:1684): pid=6781 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.921072 sshd[6779]: pam_unix(sshd:session): session closed for user core May 15 01:16:56.928852 kernel: audit: type=1106 audit(1747271816.921:1685): pid=6779 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.929005 kernel: audit: type=1104 audit(1747271816.921:1686): pid=6779 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.921000 audit[6779]: USER_END pid=6779 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.921000 audit[6779]: CRED_DISP pid=6779 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:16:56.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.100:22-147.75.109.163:54696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:56.922736 systemd-logind[1239]: Session 22 logged out. Waiting for processes to exit. May 15 01:16:56.925545 systemd[1]: sshd@20-139.178.70.100:22-147.75.109.163:54696.service: Deactivated successfully. May 15 01:16:56.926050 systemd[1]: session-22.scope: Deactivated successfully. May 15 01:16:56.926877 systemd-logind[1239]: Removed session 22. May 15 01:16:57.137284 systemd[1]: Started sshd@21-139.178.70.100:22-171.248.248.13:59566.service. May 15 01:16:57.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-171.248.248.13:59566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:16:58.244213 sshd[6791]: Invalid user sergey from 171.248.248.13 port 59566 May 15 01:16:58.275270 sshd[6791]: pam_faillock(sshd:auth): User unknown May 15 01:16:58.275000 audit[6791]: USER_AUTH pid=6791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sergey" exe="/usr/sbin/sshd" hostname=171.248.248.13 addr=171.248.248.13 terminal=ssh res=failed' May 15 01:16:58.275937 sshd[6791]: pam_unix(sshd:auth): check pass; user unknown May 15 01:16:58.275965 sshd[6791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.248.248.13 May 15 01:16:58.276300 sshd[6791]: pam_faillock(sshd:auth): User unknown May 15 01:17:00.267000 audit[5193]: AVC avc: denied { watch } for pid=5193 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_01_15_00.349578836/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c678 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c34,c678 tclass=file permissive=0 May 15 01:17:00.267000 audit[5193]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001be6840 a2=fc6 a3=0 items=0 ppid=4872 pid=5193 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c678 key=(null) May 15 01:17:00.267000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 01:17:00.560200 sshd[6791]: Failed password for invalid user sergey from 171.248.248.13 port 59566 ssh2 May 15 01:17:00.797049 sshd[6791]: Received disconnect from 171.248.248.13 port 59566:11: Bye Bye [preauth] May 15 01:17:00.797049 sshd[6791]: Disconnected from invalid user sergey 171.248.248.13 port 59566 [preauth] May 15 01:17:00.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.100:22-171.248.248.13:59566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:17:00.798323 systemd[1]: sshd@21-139.178.70.100:22-171.248.248.13:59566.service: Deactivated successfully. May 15 01:17:01.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-147.75.109.163:59220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:17:01.943140 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 01:17:01.950344 kernel: audit: type=1130 audit(1747271821.931:1692): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-147.75.109.163:59220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:17:01.932187 systemd[1]: Started sshd@22-139.178.70.100:22-147.75.109.163:59220.service. May 15 01:17:02.106000 audit[6834]: USER_ACCT pid=6834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.110960 sshd[6834]: Accepted publickey for core from 147.75.109.163 port 59220 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:17:02.111745 kernel: audit: type=1101 audit(1747271822.106:1693): pid=6834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.111000 audit[6834]: CRED_ACQ pid=6834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.117261 kernel: audit: type=1103 audit(1747271822.111:1694): pid=6834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.117319 kernel: audit: type=1006 audit(1747271822.115:1695): pid=6834 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 01:17:02.115000 audit[6834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff70c14c00 a2=3 a3=0 items=0 ppid=1 pid=6834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:17:02.120994 kernel: audit: type=1300 audit(1747271822.115:1695): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff70c14c00 a2=3 a3=0 items=0 ppid=1 pid=6834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:17:02.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:17:02.123731 kernel: audit: type=1327 audit(1747271822.115:1695): proctitle=737368643A20636F7265205B707269765D May 15 01:17:02.124371 sshd[6834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:17:02.127903 systemd[1]: Started session-23.scope. May 15 01:17:02.128126 systemd-logind[1239]: New session 23 of user core. May 15 01:17:02.131000 audit[6834]: USER_START pid=6834 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.134000 audit[6836]: CRED_ACQ pid=6836 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.138586 kernel: audit: type=1105 audit(1747271822.131:1696): pid=6834 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.138628 kernel: audit: type=1103 audit(1747271822.134:1697): pid=6836 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.881738 sshd[6834]: pam_unix(sshd:session): session closed for user core May 15 01:17:02.884000 audit[6834]: USER_END pid=6834 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.889269 systemd[1]: sshd@22-139.178.70.100:22-147.75.109.163:59220.service: Deactivated successfully. May 15 01:17:02.890744 kernel: audit: type=1106 audit(1747271822.884:1698): pid=6834 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.889853 systemd[1]: session-23.scope: Deactivated successfully. May 15 01:17:02.890292 systemd-logind[1239]: Session 23 logged out. Waiting for processes to exit. May 15 01:17:02.884000 audit[6834]: CRED_DISP pid=6834 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.100:22-147.75.109.163:59220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:17:02.895819 kernel: audit: type=1104 audit(1747271822.884:1699): pid=6834 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:02.895910 systemd-logind[1239]: Removed session 23. May 15 01:17:08.096355 systemd[1]: Started sshd@23-139.178.70.100:22-147.75.109.163:59222.service. May 15 01:17:08.154695 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 01:17:08.158054 kernel: audit: type=1130 audit(1747271828.095:1701): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-147.75.109.163:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:17:08.158682 kernel: audit: type=1400 audit(1747271828.107:1702): avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_01_16_01.3692519613/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c171,c372 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c171,c372 tclass=file permissive=0 May 15 01:17:08.158753 kernel: audit: type=1300 audit(1747271828.107:1702): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001604c60 a2=fc6 a3=0 items=0 ppid=5477 pid=5602 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c171,c372 key=(null) May 15 01:17:08.158774 kernel: audit: type=1327 audit(1747271828.107:1702): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 01:17:08.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-147.75.109.163:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:17:08.107000 audit[5602]: AVC avc: denied { watch } for pid=5602 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_01_16_01.3692519613/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c171,c372 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c171,c372 tclass=file permissive=0 May 15 01:17:08.107000 audit[5602]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001604c60 a2=fc6 a3=0 items=0 ppid=5477 pid=5602 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c171,c372 key=(null) May 15 01:17:08.107000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 01:17:08.289000 audit[6848]: USER_ACCT pid=6848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:08.313819 kernel: audit: type=1101 audit(1747271828.289:1703): pid=6848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:08.313901 kernel: audit: type=1103 audit(1747271828.296:1704): pid=6848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:08.313923 kernel: audit: type=1006 audit(1747271828.296:1705): pid=6848 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 01:17:08.313939 kernel: audit: type=1300 audit(1747271828.296:1705): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe63c31870 a2=3 a3=0 items=0 ppid=1 pid=6848 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:17:08.313956 kernel: audit: type=1327 audit(1747271828.296:1705): proctitle=737368643A20636F7265205B707269765D May 15 01:17:08.296000 audit[6848]: CRED_ACQ pid=6848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:08.296000 audit[6848]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe63c31870 a2=3 a3=0 items=0 ppid=1 pid=6848 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 01:17:08.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 01:17:08.391355 sshd[6848]: Accepted publickey for core from 147.75.109.163 port 59222 ssh2: RSA SHA256:YZM/HFbfbKbCMyxHxRH5w93dQ/AdvMi+wFj0w9zjch4 May 15 01:17:08.322969 sshd[6848]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 01:17:08.540453 systemd[1]: Started session-24.scope. May 15 01:17:08.540597 systemd-logind[1239]: New session 24 of user core. May 15 01:17:08.558195 kernel: audit: type=1105 audit(1747271828.544:1706): pid=6848 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:08.544000 audit[6848]: USER_START pid=6848 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:08.548000 audit[6850]: CRED_ACQ pid=6850 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:09.806444 sshd[6848]: pam_unix(sshd:session): session closed for user core May 15 01:17:09.808000 audit[6848]: USER_END pid=6848 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:09.809000 audit[6848]: CRED_DISP pid=6848 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 01:17:09.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.100:22-147.75.109.163:59222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 01:17:09.814391 systemd[1]: sshd@23-139.178.70.100:22-147.75.109.163:59222.service: Deactivated successfully. May 15 01:17:09.815007 systemd[1]: session-24.scope: Deactivated successfully. May 15 01:17:09.815380 systemd-logind[1239]: Session 24 logged out. Waiting for processes to exit. May 15 01:17:09.815995 systemd-logind[1239]: Removed session 24.